Sciweavers

2699 search results - page 404 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
ICNP
1998
IEEE
14 years 1 months ago
Flow Theory: An Enhancement
Flow Theory is a rich, effective theory introduced in order to study real-time network protocols. It is based on discrete mathematics in which a flow of data is represented by an ...
Alfio Lombardo, Giacomo Morabito, Sergio Palazzo, ...
IEICET
2006
109views more  IEICET 2006»
13 years 10 months ago
Capacity of VoIP over HSDPA with Frame Bundling
In this paper, we evaluate the capacity of voice over internet protocol (VoIP) services over high-speed downlink packet access (HSDPA), in which frame-bundling (FB) is incorporated...
Yong-Seok Kim
SOCO
2008
Springer
13 years 10 months ago
A Reflective Framework for Fine-Grained Adaptation of Aspect-Oriented Compositions
Dynamic Aspect Oriented Programming (AOP) technologies typically provide coarse-grained mechanisms for adapting aspects that cross-cut a system deployment; i.e. whole aspect module...
Paul Grace, Bert Lagaisse, Eddy Truyen, Wouter Joo...
TSP
2008
107views more  TSP 2008»
13 years 10 months ago
Opportunistic Spectrum Access via Periodic Channel Sensing
The problem of opportunistic access of parallel channels occupied by primary users is considered. Under a continuous-time Markov chain modeling of the channel occupancy by the prim...
Qing Zhao, Stefan Geirhofer, Lang Tong, Brian M. S...
DB
1998
119views more  DB 1998»
13 years 9 months ago
SimDS: A Simulation Environment for the Design of Distributed Database Systems
Design of a distributed transaction processing system is a complex process. The paper describes the design and implementation of a general purpose scalable simulation environment ...
Alok R. Chaturvedi, Samir Gupta, Subhajyoti Bandyo...