Sciweavers

10077 search results - page 1896 / 2016
» Mobile Networking in the Internet
Sort
View
NCA
2008
IEEE
15 years 10 months ago
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks
Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure techniques try to detect attack and then filter out DoS at...
Hakem Beitollahi, Geert Deconinck
ICNP
2007
IEEE
15 years 10 months ago
Best Effort Session-Level Congestion Control
— Congestion caused by a large number of interacting TCP flows at a bottleneck network link is different from that caused by a lesser number of flows sending large amounts of d...
S. Ramesh, Sneha Kumar Kasera
MSS
2007
IEEE
100views Hardware» more  MSS 2007»
15 years 10 months ago
Efficient Logging and Replication Techniques for Comprehensive Data Protection
Mariner is an iSCSI-based storage system that is de­ signed to provide comprehensive data protection on com­ modity ATA disk and Gigabit Ethernet technologies while offering the...
Maohua Lu, Shibiao Lin, Tzi-cker Chiueh
SEMWEB
2007
Springer
15 years 10 months ago
JeromeDL - a Semantic Digital Library
Abstract. JeromeDL is a Semantic Digital Library engine. It uses Semantic Web and Social Networking technologies to improve browsing and searching for resources. With JeromeDL’s ...
Sebastian Ryszard Kruk, Tomasz Woroniecki, Adam Gz...
143
Voted
NOMS
2006
IEEE
169views Communications» more  NOMS 2006»
15 years 10 months ago
Real-Time Measurement of End-to-End Available Bandwidth using Kalman Filtering
—This paper presents a new method, BART (Bandwidth Available in Real-Time), for estimating the end-toend available bandwidth over a network path. It estimates bandwidth quasi-con...
Svante Ekelin, Martin Nilsson, Erik Hartikainen, A...
« Prev « First page 1896 / 2016 Last » Next »