Sciweavers

886 search results - page 73 / 178
» Is It Only About Internet Access
Sort
View
IM
2007
13 years 10 months ago
Planning and Managing the IPTV Service Deployment
Abstract— The deployment of converged services of TV, telephony, and Internet access over IP entails a significant initial investment for service providers. This investment is n...
Dakshi Agrawal, Mandis Beigi, Chatschik Bisdikian,...
ENTCS
2007
112views more  ENTCS 2007»
13 years 8 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
IJDE
2007
77views more  IJDE 2007»
13 years 8 months ago
Session Based Packet Marking and Auditing for Network Forensics
The widely acknowledged problem of reliably identifying the origin of network data has been the subject of many research works. Due to the nature of Internet Protocol, a source IP...
Omer Demir, Ping Ji, Jinwoo Kim
WETICE
2009
IEEE
14 years 3 months ago
Secure Peer Sampling Service: The Mosquito Attack
Peer sampling – the capability of obtaining a random sample from a large population of peers – is a basic building block for the gossip paradigm. Current peer sampling service...
Gian Paolo Jesi, Alberto Montresor
PIMRC
2008
IEEE
14 years 3 months ago
An optimization framework for the joint routing and scheduling in Wireless Mesh Networks
—In this paper, we address the problem of computing the transport capacity of Wireless Mesh Networks dedicated to Internet access. Routing and transmission scheduling have a majo...
Christelle Molle, Fabrice Peix, Hervé Rivan...