Sciweavers

2014 search results - page 116 / 403
» Network Management Challenges for Next Generation Networks
Sort
View
CCS
2007
ACM
14 years 2 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
COMCOM
2008
154views more  COMCOM 2008»
13 years 8 months ago
Analysis of hybrid P2P overlay network topology
Modeling peer-to-peer (P2P) networks is a challenge for P2P researchers. In this paper, we provide a detailed analysis of large-scale hybrid P2P overlay network topology, using Gn...
Chao Xie, Guihai Chen, Art Vandenberg, Yi Pan
BTW
2007
Springer
185views Database» more  BTW 2007»
14 years 2 months ago
Data Staging for OLAP- and OLTP-Applications on RFID Data
: The emerging trend towards seamless monitoring of all business processes via comprehensive sensor networks – in particular RFID readers – creates new data management challeng...
Stefan Krompass, Stefan Aulbach, Alfons Kemper
BROADNETS
2007
IEEE
14 years 2 months ago
Route diversity: A future for transmission protocols?
—This contribution is attempting to show how a route diversity can improve the traffic behavior of a connection between two network entities. The most used transmission protocol...
Foued Melakessou, Ulrich Sorger, Zdzislaw Suchanec...
ICSNC
2007
IEEE
14 years 2 months ago
Automated QoS policy adaptation for heterogeneous access network environments
To support QoS guarantee and resource usage in heterogeneous access network environments more efficiently (UMTS, WIMAX, WLAN DVB-T, DVB-H), there is the challenge of automated con...
Pedro A. Aranda-Gutiérrez, Ilka Miloucheva