Enterprise networks today carry a range of mission critical communications. A successful worm attack within an enterprise network can be substantially more devastating to most com...
Patrick Drew McDaniel, Subhabrata Sen, Oliver Spat...
The strength of hash functions such as MD5 and SHA-1 has been called into question as a result of recent discoveries. Regardless of whether or not it is necessary to move away fro...
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want ...
: Light-trail as a candidate for dynamic provisioning and sub-wavelength grooming has been investigated before. A light-trail is an example of an intelligent unidirectional wavelen...
— In this study, Voice over IP (VoIP) performance in multi-layered satellite IP networks with on-board processing (OBP) capability is investigated. With on-board processing, a sa...
The ability to reserve network bandwidth is critical for the success of high-performance grid applications. While reservation of lightpaths in dynamically switched optical network...
Service Level Agreement Management in the telecommunications domain consists of a set of mechanisms for provisioning and monitoring services according to requirements given by eit...
As efforts to develop grid computing solutions gather pace, considerable attention has been directed at defining and addressing technical requirements associated with computationa...
Ernest Sithole, Gerard P. Parr, Sally I. McClean, ...
This paper introduces a fault-tolerant group communication protocol that is aimed at grid and wide area environments. The protocol has two layers. The lower layer provides a total...
— Pervasive computing is a new and emerging technology. The concept of pervasiveness and its deployment into reality are still not well aligned. This is because the vision of per...
Fiona Mahon, Jelena Mitic, Micheal Crotty, Kevin D...