Sciweavers

551 search results - page 87 / 111
» Probing TCP Implementations
Sort
View
LCN
2000
IEEE
14 years 17 hour ago
Efficient Congestion Avoidance Mechanism
The nowadays Internet architecture is mainly based on unicast communications and best-effort service. However, the development of the Internet encouraged emerging services that ar...
Anca Dracinschi Sailer, Serge Fdida
ECOWS
2007
Springer
13 years 10 months ago
SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services
Key establishment is essential for many applications of cryptography. Its purpose is to negotiate keys for other cryptographic schemes, usually for encryption and authentication. I...
Sebastian Gajek, Lijun Liao, Bodo Möller, J&o...
EURONGI
2008
Springer
13 years 10 months ago
Performance Evaluation of DTSN in Wireless Sensor Networks
The guaranteed delivery of critical data is an essential requirement in most Wireless Sensor Network (WSN) applications. The paucity of energy, communication, processing and storag...
Francisco Rocha, António Grilo, Paulo Rog&e...
FECS
2006
529views Education» more  FECS 2006»
13 years 9 months ago
Student Projects in Computer Networking: Simulation versus Coding
In this paper, we discuss the advantages and disadvantages of using network simulators to teach networking concepts versus having students write programs. The authors have experie...
Leann Christianson, Kevin Q. Brown
USITS
2001
13 years 9 months ago
Fine-Grained Failover Using Connection Migration
This paper presents a set of techniques for providing fine-grained failover of long-running connections across a distributed collection of replica servers, and is especially usefu...
Alex C. Snoeren, David G. Andersen, Hari Balakrish...