Sciweavers

5324 search results - page 932 / 1065
» Internet Security Protocols
Sort
View
IPPS
2008
IEEE
14 years 2 months ago
An effective pointer replication algorithm in P2P networks
Peer-to-Peer (P2P) networks have proven to be an efficient and successful mechanism for file sharing over the Internet. However, current P2P protocols have long worst case query...
Jian Zhou, Laxmi N. Bhuyan, Anirban Banerjee
ISVLSI
2008
IEEE
129views VLSI» more  ISVLSI 2008»
14 years 2 months ago
Smart-NICs: Power Proxying for Reduced Power Consumption in Network Edge Devices
The number of edge devices connected to the Internet is increasing at a rapid rate. To maintain network connectivity, the majority of these devices remain completely powered on wh...
Karthik Sabhanatarajan, Ann Gordon-Ross, Mark Oden...
WIMOB
2008
IEEE
14 years 2 months ago
A Distributed Scheduling Algorithm with QoS Provisions in Multi-hop Wireless Mesh Networks
—Multi-hop wireless mesh networks (WMNs) are considered a promising technology to backhaul heterogeneous data traffic from wireless access networks to the wired Internet. WMNs a...
Chi Harold Liu, Athanasios Gkelias, Yun Hou, Kin K...
AINA
2007
IEEE
14 years 2 months ago
On the Miscollaboration of Congestion Control Mechanisms at the Transport and the Network Layers
Many sophisticated mechanisms have been implemented at both the transport and the network layers in order to estimate network conditions and avoid overload of network links. We ev...
Ageliki Tsioliaridou, Christos V. Samaras, Vassili...
GLOBECOM
2007
IEEE
14 years 2 months ago
Multiconstrained QoS Routing: Greedy is Good
— A fundamental problem in quality-of-service (QoS) routing is to find a path connecting a source node to a destination node that satisfies K ≥ 2 additive QoS constraints. Th...
Guoliang Xue, Weiyi Zhang