Sciweavers

AINA
2004
IEEE
14 years 3 months ago
Performance Evaluation of an IPv6-capable H323 Application
OpenH323 is an open source H.323 implementation that has been ported to IPv6. In this paper we briefly introduce the library architecture and the performance citeria with which th...
Christos Bouras, Apostolos Gkamas, Dimitris Primpa...
AINA
2004
IEEE
14 years 3 months ago
Performance Improvement for GPRS, WLAN Integration using Ad Hoc Networks
As the wireless technology evolves, one can access the Internet almost everywhere via many wireless access networks such as wireless LAN and GPRS. People would like to use the wir...
Jui-Ming Chen, Li-Der Chou
AINA
2004
IEEE
14 years 3 months ago
Balancing Workload based on Content Types for Scalable Web Server Clusters
With the rapid growth of information stored in worldwide web servers, searching and capturing data on Internet become a common behavior for us. In order to increase the availabili...
Tzung-Shi Chen, Kuo-Lian Chen
AINA
2004
IEEE
14 years 3 months ago
Analysis of Grid Service Composition with BPEL4WS
The Open Grid Services Infrastructure (OGSI) defines a distributed system framework by integrating Grid and Web services technologies to facilitate resource sharing. In OGSI, Web ...
Kuo-Ming Chao, Muhammad Younas, Nathan Griffiths, ...
AINA
2004
IEEE
14 years 3 months ago
ZBP: A Zone-based Broadcasting Protocol for Wireless Sensor Networks
Abstract. Wireless Sensor Networks (WSNs) have been widely used in motoring and collecting interests of environment information. Packet flooding or broadcasting is an essential fun...
Chih-Yung Chang, Kuei-Ping Shih, Shih-Chieh Lee
AINA
2004
IEEE
14 years 3 months ago
A Small IP Forwarding Table Using Hashing
As the demand for high bandwidth on the Internet increases, it is required to build next generation routers with the capability of forwarding multiple millions of packets per secon...
Yeim-Kuan Chang, Wen-Hsin Cheng
AINA
2004
IEEE
14 years 3 months ago
Secret Sharing with Access Structures in a Hierarchy
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access structures in a hierarchy. They used the concept of discrete logarithmto reuse shado...
Chin-Chen Chang, Chu-Hsing Lin, Wei Lee, Pai-Cheng...
AINA
2004
IEEE
14 years 3 months ago
Using the Extension Function of XSLT and DSL to Secure XML Documents
XSLT is a very popular and flexible language for transforming XML documents which provides a powerful implementation of a tree-oriented transformation language for transmuting ins...
Tao-Ku Chang, Gwan-Hwan Hwang
WCNC
2010
IEEE
14 years 3 months ago
Impact of Power Control on Relay Load Balancing in Wireless Sensor Networks
—When shortest path routing is employed in large scale multi-hop wireless networks, nodes located near the center of the network have to perform disproportional amount of relayin...
Parth H. Pathak, Rudra Dutta
WCNC
2010
IEEE
14 years 3 months ago
MAC Performance Analysis for Vehicle-to-Infrastructure Communication
—The newly emerged vehicular ad hoc network adopts the contention based IEEE 802.11 DCF as its MAC. While it has been extensively studied in the stationary indoor environment (e....
Tom H. Luan, Xinhua Ling, Xuemin Shen