Sciweavers

2699 search results - page 474 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
TRIDENTCOM
2006
IEEE
14 years 1 months ago
Creating wireless multi-hop topologies on space-constrained indoor testbeds through noise injection
— To evaluate routing protocols on a controlled indoor wireless testbed, the radio range must be compressed so that larger multi-hop topologies can be mapped into a laboratorysiz...
Sanjit Krishnan Kaul, Marco Gruteser, Ivan Seskar
TRIDENTCOM
2006
IEEE
14 years 1 months ago
CMT II: An agent based framework for comprehensive IP measurements
— The Communication Measurement Tool II (CMT II) is a framework for comprehensive IP measurements. It is the next development stage of the succeeded measurement framework called ...
Thomas Pfeiffenberger, Thomas Fichtel
IMC
2006
ACM
14 years 1 months ago
BGP convergence in virtual private networks
Multi-protocol label switching (MPLS) virtual private networks (VPNs) have had significant and growing commercial deployments. In this paper we present the first systematic stud...
Dan Pei, Jacobus E. van der Merwe
MOBICOM
2006
ACM
14 years 1 months ago
Towards lightweight information dissemination in inter-vehicular networks
Vehicular ad hoc networks have recently been proposed as an effective tool for improving both road safety and the comfort experienced while driving. Vehicles may propagate inform...
Paolo Costa, Davide Frey, Matteo Migliavacca, Luca...
DFMA
2005
IEEE
122views Multimedia» more  DFMA 2005»
14 years 1 months ago
Distributed Management Architecture for Multimedia Conferencing Using SIP
As various multimedia communication services are increasingly required by Internet users, several signaling protocols have been proposed for the efficient control of multimedia co...
Yeong-Hun Cho, Moon-Sang Jeong, Jong-Tae Park, Wee...