Sciweavers

187 search results - page 13 / 38
» On the characterizations of (S, N)-implications
Sort
View
INFOCOM
1996
IEEE
14 years 1 months ago
Network Algorithms and Protocol for Multimedia Servers
In this paper, we present a network service specifically designed for multimedia servers. It uses a histogram based traffic characterization and an overload control protocol to el...
Pawan Goyal, Harrick M. Vin
SASN
2006
ACM
14 years 3 months ago
Attacker traceback with cross-layer monitoring in wireless multi-hop networks
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
Yongjin Kim, Ahmed Helmy
BMCBI
2010
102views more  BMCBI 2010»
13 years 9 months ago
Alignment and clustering of phylogenetic markers - implications for microbial diversity studies
Background: Molecular studies of microbial diversity have provided many insights into the bacterial communities inhabiting the human body and the environment. A common first step ...
James Robert White, Saket Navlakha, Niranjan Nagar...
WIOPT
2005
IEEE
14 years 3 months ago
A Novel Framework for Radio Resource Management in IEEE 802.11 Wireless LANs
In this paper we address the need to characterize and quantify resource usage in IEEE 802.11 WLANs in order to support radio resource management. We present a compact and intuitiv...
Mark Davis, Tristan Raimondi
IFIPTCS
2010
13 years 7 months ago
Safe Equivalences for Security Properties
Abstract. In the field of Security, process equivalences have been used to characterize various information-hiding properties (for instance secrecy, anonymity and non-interference)...
Mário S. Alvim, Miguel E. Andrés, Ca...