Sciweavers

5234 search results - page 1004 / 1047
» Simulation of Computer Network Attacks
Sort
View
WECWIS
2006
IEEE
102views ECommerce» more  WECWIS 2006»
15 years 8 months ago
Soft Real-Time Aspects for Service-Oriented Architectures
In today’s businesses we can see the trend that serviceoriented architectures (SOA) represent the main paradigm for IT infrastructures. In this setting, a software offers its fu...
Michael C. Jaeger, Gero Mühl
LCN
2005
IEEE
15 years 8 months ago
Modelling of SACK TCP and application to the HTTP File Transfer Environment
It is known that analytic modelling for TCP latency is a non trivial task. Recently, some significant progress has been made, such as the comprehensive result by Sikdar et al. Ho...
Damien Phillips, Jiankun Hu
LCN
2005
IEEE
15 years 8 months ago
On the Server Fairness of Congestion Control in the ISP Edge Router
The Internet Engineering Task Force (IETF) recommended the deployment of Active Queue Management (AQM) in the Internet routers in 1998. There were more than 50 new AQM algorithms ...
Hsien-Ming Wu, Chin-Chi Wu, Woei Lin
P2P
2005
IEEE
15 years 8 months ago
Video Management in Peer-to-Peer Systems
Providing scalable video services in a peer-to-peer (P2P) environment is challenging. Since videos are typically large and require high communication bandwidth for delivery, many ...
Ying Cai, Zhan Chen, Wallapak Tavanapong
P2P
2005
IEEE
104views Communications» more  P2P 2005»
15 years 8 months ago
Range Queries in Trie-Structured Overlays
Among the open problems in P2P systems, support for non-trivial search predicates, standardized query languages, distributed query processing, query load balancing, and quality of...
Anwitaman Datta, Manfred Hauswirth, Renault John, ...
« Prev « First page 1004 / 1047 Last » Next »