Sciweavers

CN
1999
92views more  CN 1999»
13 years 6 months ago
Managing TCP Connections Under Persistent HTTP
Hyper Text Transfer Protocol (HTTP) traffic dominates Internet traffic. The exchange of HTTP messages is implemented
Edith Cohen, Haim Kaplan, Jeffrey D. Oldham
CN
1999
126views more  CN 1999»
13 years 6 months ago
Towards a Better Understanding of Web Resources and Server Responses for Improved Caching
This work focuses on characterizing information about Web resources and server responses that is relevant to Web caching. The approach is to study a set of URLs at a variety of si...
Craig E. Wills, Mikhail Mikhailov
CN
1999
100views more  CN 1999»
13 years 6 months ago
Testing protocols modeled as FSMs with timing parameters
An optimization method is introduced for generating minimum-length test sequences taking into account timing constraints for FSM models of communication protocols. Due to active t...
M. Ümit Uyar, Mariusz A. Fecko, Adarshpal S. ...
CN
1999
128views more  CN 1999»
13 years 6 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
CN
1999
88views more  CN 1999»
13 years 6 months ago
Building a high-performance, programmable secure coprocessor
Secure coprocessors enable secure distributed applications by providing safe havens where an application program can Z .execute and accumulate state , free of observation and inte...
Sean W. Smith, Steve Weingart
CN
1999
98views more  CN 1999»
13 years 6 months ago
Managing application level quality of service through TOMTEN
With the growth of mobile computing, users will have simultaneous access to multiple overlaid networks, each with Zdifferent characteristics, services and costs. This paper introd...
R. De Silva, Björn Landfeldt, Sebastien Ardon...
CN
1999
106views more  CN 1999»
13 years 6 months ago
Impact of wireless access on traffic management in ATM networks
Traffic management plays an important role in providing differentiated quality of service to the users and to support the integration of a variety of broadband services within a c...
Rolf Sigle, Thomas Renger
CN
1999
98views more  CN 1999»
13 years 6 months ago
Mobility information for resource management in wireless ATM networks
ZUser mobility poses a significant technical challenge to network resource management in wireless ATM Asynchronous . Z .Transfer Mode networks. In order to guarantee quality of se...
Xuemin Shen, Jon W. Mark
CN
1999
119views more  CN 1999»
13 years 6 months ago
Internet Telephony: Architecture and Protocols - an IETF Perspective
Internet telephony offers the opportunity to design a global multimedia communications system that may eventually replace the existing telephony infrastructure. We describe the up...
Henning Schulzrinne, Jonathan Rosenberg
CN
1999
84views more  CN 1999»
13 years 6 months ago
Implementation of the pan-European academic research network: TEN-155
This paper addresses the implementation of a pan-European network to support co-operative research amongst European researchers: TEN-155. Predecessors to TEN-155 were TEN-34 and E...
Roberto Sabatino, Jose Manuel de Arce