— with the ubiquity of handheld devices people can now access information and conduct online transactions virtually anywhere and anytime. In such flexible but less reliable envir...
— Developing and managing firewall Access Control Lists (ACLs) are hard, time-consuming, and error-prone tasks for a variety of reasons. Complexity of networks is constantly incr...
— Growing popularity of wireless ad hoc networks leads to higher demands on performance of all TCP/IP stack layers. Usually ad hoc networks operate according to IEEE 802.11 stand...
Stepan Ivanov, Dmitri Botvich, Sasitharan Balasubr...
— CAPTCHA is a technique that is used to prevent automatic programs from being able to acquire free e-mail or online service accounts. However, as many researchers have already r...
Takumi Yamamoto, J. Doug Tygar, Masakatsu Nishigak...
Abstract—Several protocols for ad hoc network try to reduce redundancy as an effective measure against broadcast problems. Though these protocols ensure good performance in a fav...
—Advances in Cloud computing enable new possibilities to Internet applications developers. Previously, the main concern of Internet applications developers was deployment and hos...
Bhathiya Wickremasinghe, Rodrigo N. Calheiros, Raj...
Abstract—Directed Acyclic Graphs (DAGs), rooted at popular/default destinations, have emerged as a preferred mechanism to provide IPv6 routing functionality in large scale low po...
—Conventional broadcasting protocols suffer from network congestion, frequent message losses and corruption of broadcast messages due to a vast number of duplicate packets transm...
Subrata Saha, Syed Rafiul Hussain, A. K. M. Ashiku...
In order to show both a detailed map (Focus) and a widearea map (Context) in one map, we have proposed the Focus+Glue+Context map, a type of fisheye view for mobile maps. A probl...
We propose SAGE (Service Oriented Architecture Governance Evaluation) as a quantitative approach, to evaluate the impact of SOA governance policies on prominent quality attributes...