Sciweavers

1639 search results - page 139 / 328
» internet 2006
Sort
View
CSREASAM
2006
15 years 5 months ago
A Proposal of One-Time Biometric Authentication
- In biometric authentication, feature information of each enrolled person's biometric information is enrolled as templates. Secure databases or anti-tampered devices store th...
Yoshifumi Ueshige, Kouichi Sakurai
CORR
2006
Springer
166views Education» more  CORR 2006»
15 years 4 months ago
Bounding the Bias of Tree-Like Sampling in IP Topologies
Abstract. It is widely believed that the Internet's AS-graph degree distribution obeys a power-law form. However, it was recently argued that since Internet data is collected ...
Reuven Cohen, Mira Gonen, Avishai Wool
JNW
2008
79views more  JNW 2008»
15 years 3 months ago
A Proportional Jitter Scheduling and Buffer Management Algorithm for Differentiated Services Networks
This paper proposes a method for scheduling and buffer management in differentiated services networks which is based on JoBS algorithm. JoBS differentiates traffic classes base on ...
Mohammad Hossien Yaghmaee, Ghazale Khojasteh Tousi
AICT
2006
IEEE
115views Communications» more  AICT 2006»
15 years 10 months ago
Implementation of two Resilience Mechanisms using Multi Topology Routing and Stub Routers
— Resilient Routing Layers (RRL) and Multiple Routing Configurations (MRC) have been proposed as methods to achieve fast recovery from router and link failures in connectionless...
Stein Gjessing
JSAC
2006
93views more  JSAC 2006»
15 years 4 months ago
Towards a Generalized Stochastic Model of End-to-End Packet-Pair Sampling
End-to-end packet-pair probing has been used as one of the primary mechanisms to measure bottleneck capacity, crosstraffic intensity, and available bandwidth of end-to-end Internet...
Xiliang Liu, Kaliappa Nadar Ravindran, Dmitri Logu...