Sciweavers

712 search results - page 113 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
EJWCN
2010
115views more  EJWCN 2010»
13 years 2 months ago
Efficient Certification Path Discovery for MANET
A Mobile Ad Hoc Network (MANET) is characterized by the lack of any infrastructure, absence of any kind of centralized administration, frequent mobility of nodes, network partitio...
Georgios Kambourakis, Elisavet Konstantinou, Anast...
SIGCOMM
2009
ACM
14 years 2 months ago
Diverter: a new approach to networking within virtualized infrastructures
As virtualized data-centres become the back-end platforms behind a new generation of utility and cloud computing infrastructures (such as AmazonAWS [1]) their multi-tenancy, scale...
Aled Edwards, Anna Fischer, Antonio Lain
INFOCOM
1999
IEEE
13 years 12 months ago
A Model for Window Based Flow Control in Packet-Switched Networks
Recently, networks have increased rapidly both in scale and speed. Problems related to the control and management are of increasing interest. The average throughput and end-to-end ...
Xiaowei Yang
LCN
2005
IEEE
14 years 1 months ago
Automated Traffic Classification and Application Identification using Machine Learning
The dynamic classification and identification of network applications responsible for network traffic flows offers substantial benefits to a number of key areas in IP network engi...
Sebastian Zander, Thuy T. T. Nguyen, Grenville J. ...
AINA
2008
IEEE
14 years 2 months ago
Intra Domain Route Optimization for Ubiquitous
The main advantage of a wireless network is user mobility, which calls for efficient routing support at the network layer. An architecture combines hierarchical mobile IPv6 and ne...
Hye-Young Kim, Young-Sik Jeong, Laurence Tianruo Y...