Sciweavers

1653 search results - page 270 / 331
» Timed analysis of security protocols
Sort
View
INFOCOM
1997
IEEE
14 years 12 days ago
An Empirical Model of HTTP Network Traffic
The workload of the global Internet is dominated by the Hypertext Transfer Protocol (HTTP), an application protocol used by World Wide Web clients and servers. Simulation studies ...
Bruce A. Mah
LISA
2007
13 years 11 months ago
NetADHICT: A Tool for Understanding Network Traffic
Computer and network administrators are often confused or uncertain about the behavior of their networks. Traditional analysis using IP ports, addresses, and protocols are insuffi...
Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, An...
ANOR
2007
151views more  ANOR 2007»
13 years 9 months ago
Distributed personnel scheduling - negotiation among scheduling agents
This paper introduces a model for Distributed Employee Timetabling Problems (DisETPs) and proposes a general architecture for solving DisETPs by using a Multi Agent System (MAS) pa...
Eliezer Kaplansky, Amnon Meisels
JSAC
2006
93views more  JSAC 2006»
13 years 8 months ago
Performance Enhancement of On-Board Communication Networks Using Outage Prediction
Abstract--A research area that has become increasingly important in recent years is that of on-board mobile communication, where users on a vehicle are connected to a local network...
Adeel Baig, Lavy Libman, Mahbub Hassan
IAJIT
2007
146views more  IAJIT 2007»
13 years 8 months ago
Adaptive Optimizing of Hello Messages in Wireless Ad-Hoc Networks
: Routing is an important functional aspect in wireless ad-hoc networks that handles discovering and maintaining the paths between nodes within a network. Due to nodes mobility, th...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...