Sciweavers

265 search results - page 31 / 53
» Security Patterns for Voice over IP Networks
Sort
View
ACMSE
2008
ACM
14 years 5 days ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
COMCOM
2006
92views more  COMCOM 2006»
13 years 10 months ago
Loss and Delay Measurements of Internet Backbones
As the Internet evolves into a universal network for all communication needs, it has to stand up to the high quality standards of traditional networks, such as the telephone netwo...
Athina Markopoulou, Fouad A. Tobagi, Mansour J. Ka...
IWDC
2001
Springer
210views Communications» more  IWDC 2001»
14 years 2 months ago
Access Control Protocols for Interconnected WDM Rings in the DAVID Metro Network
DAVID (Data And Voice Integration over D-WDM) is a research project sponsored by the European Community aimed at the design of an optical packet-switched network for the transport ...
Andrea Bianco, Giulio Galante, Emilio Leonardi, Fa...
ICC
2007
IEEE
106views Communications» more  ICC 2007»
14 years 4 months ago
A Model-based Admission Control for IEEE 802.11e Networks
Abstract—The recently approved IEEE 802.11e standard improves the support for real-time multimedia applications in Wireless LANs. Yet, to provide some level of guarantee in terms...
Rosario Giuseppe Garroppo, Stefano Giordano, Stefa...
ICNP
2000
IEEE
14 years 2 months ago
Dynamic Internet Overlay Deployment and Management Using the X-Bone
The X-Bone dynamically deploys and manages Internet overlays to reduce con®guration e€ort and increase network component sharing. The X-Bone discovers, con®gures, and monitors ...
Joseph D. Touch