Sciweavers

2880 search results - page 501 / 576
» Using Channels for Multimedia Communication
Sort
View
ACMSE
2006
ACM
14 years 4 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin
SAINT
2005
IEEE
14 years 3 months ago
Trace System of iSCSI Storage Access
In this paper, an IP-SAN access trace method is proposed and its implementation is presented. IP-SAN and iSCSI are expected to remedy problems of Fibre Channel (FC)-based SAN. Bec...
Saneyasu Yamaguchi, Masato Oguchi, Masaru Kitsureg...
EUC
2005
Springer
14 years 3 months ago
PULSE: A MAC Protocol for RFID Networks
1 The reader collision problem occurs when the signal from one reader interferes with the signal from other readers. Solutions like RTS-CTS are not applicable because a reader may ...
Shailesh M. Birari, Sridhar Iyer
DSN
2002
IEEE
14 years 3 months ago
Secure Intrusion-tolerant Replication on the Internet
This paper describes a Secure INtrusion-Tolerant Replication Architecture1 (SINTRA) for coordination in asynchronous networks subject to Byzantine faults. SINTRA supplies a number...
Christian Cachin, Jonathan A. Poritz
HICSS
2000
IEEE
172views Biometrics» more  HICSS 2000»
14 years 2 months ago
Sustained Knowledge Management by Organizational Culture
Preserving and fostering knowledge is the vital interest of a network-like virtual organization. The decentralized and geographically distributed organizational structure inhibits...
Birgit Lemken, Helge Kahler, Markus Rittenbruch