Sciweavers

5324 search results - page 833 / 1065
» Internet Security Protocols
Sort
View
CN
2006
106views more  CN 2006»
13 years 9 months ago
Efficient large-scale BGP simulations
Simulation has been the method of choice for analyzing large, complex, and highly volatile systems. One of these systems is the inter-domain routing infrastructure of the Internet...
Xenofontas A. Dimitropoulos, George F. Riley
IEICET
2006
109views more  IEICET 2006»
13 years 9 months ago
Capacity of VoIP over HSDPA with Frame Bundling
In this paper, we evaluate the capacity of voice over internet protocol (VoIP) services over high-speed downlink packet access (HSDPA), in which frame-bundling (FB) is incorporated...
Yong-Seok Kim
JSAC
2006
103views more  JSAC 2006»
13 years 9 months ago
Quality-of-service provisioning and efficient resource utilization in CDMA cellular communications
One of the major challenges in supporting multimedia services over Internet protocol (IP)-based code-division multiple-access (CDMA) wireless networks is the quality-of-service (Qo...
Hai Jiang, Weihua Zhuang, Xuemin Shen, Qi Bi
EOR
2007
84views more  EOR 2007»
13 years 9 months ago
The multi-layered network design problem
act 11 We address the problem of designing a network built on several layers. This problem occurs in practical applications 12 but has not been studied extensively from the point o...
Arnaud Knippel, Benoit Lardeux
IJDE
2007
77views more  IJDE 2007»
13 years 9 months ago
Session Based Packet Marking and Auditing for Network Forensics
The widely acknowledged problem of reliably identifying the origin of network data has been the subject of many research works. Due to the nature of Internet Protocol, a source IP...
Omer Demir, Ping Ji, Jinwoo Kim