Sciweavers

712 search results - page 117 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
SIGCOMM
2012
ACM
11 years 9 months ago
Bulk of interest: performance measurement of content-centric routing
The paradigm of information-centric networking subsumes recent approaches to integrate content replication services into a future Internet layer. Current concepts foster either a ...
Matthias Wählisch, Thomas C. Schmidt, Markus ...
SIGCOMM
1998
ACM
13 years 11 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
WWIC
2009
Springer
157views Communications» more  WWIC 2009»
14 years 1 months ago
An Adaptive Optimized RTO Algorithm for Multi-homed Wireless Environments
As a transport layer protocol SCTP uses end to end metrics, such as Retransmission Time Out (RTO), to manage mobility handover. Our investigation illustrates that Wireless LAN (WLA...
Sheila Fallon, Paul Jacob, Yuansong Qiao, Liam Mur...
CN
2006
174views more  CN 2006»
13 years 7 months ago
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey
Today's wireless networks are characterized by a fixed spectrum assignment policy. However, a large portion of the assigned spectrum is used sporadically and geographical var...
Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Sh...
TDSC
2010
146views more  TDSC 2010»
13 years 1 months ago
Fault Localization via Risk Modeling
Automated, rapid, and effective fault management is a central goal of large operational IP networks. Today's networks suffer from a wide and volatile set of failure modes, wh...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...