Sciweavers

CN
2006
111views more  CN 2006»
13 years 11 months ago
Analytical modeling of CAC in next generation wireless systems
Though Connection Admission Control (CAC) in wireless networks has been studied extensively, the heterogeneous structure of Next Generation Wireless Systems (NGWS) makes CAC very ...
Tuna Tugcu, H. Birkan Yilmaz, Feodor S. Vainstein
CN
2006
78views more  CN 2006»
13 years 11 months ago
CNPGSDP: An efficient group-based service discovery protocol for MANETs
The ability to discover services is the major prerequisite for effective usability of MANETs. Group-based Service Discovery (GSD) protocol is a typical service discovery protocol ...
Zhen-guo Gao, Ling Wang, Mei Yang, Xiaozong Yang
CN
2006
58views more  CN 2006»
13 years 11 months ago
Tackling Web dynamics by programmable proxies
Web services are becoming increasingly complex as users become more experienced in their requests to access an ever growing collection of information on the Web. In this paper we ...
Delfina Malandrino, Vittorio Scarano
CN
2006
99views more  CN 2006»
13 years 11 months ago
High-performance switching based on buffered crossbar fabrics
As buffer-less crossbar scheduling algorithms reach their practical limitations due to higher port numbers and data rates, internally buffered crossbar (IBC) switches have gained ...
Lotfi Mhamdi, Mounir Hamdi, Christopher Kachris, S...
CN
2006
126views more  CN 2006»
13 years 11 months ago
Web dynamics and their ramifications for the development of Web search engines
The World Wide Web has become the largest hypertext system in existence, providing an extremely rich collection of information resources. Compared with conventional information so...
Yiping Ke, Lin Deng, Wilfred Ng, Dik Lun Lee
CN
2006
84views more  CN 2006»
13 years 11 months ago
Distributed mechanism in detecting and defending against the low-rate TCP attack
In this paper, we consider a distributed mechanism to detect and to defend against the low-rate TCP attack. The low-rate TCP attack is a recently discovered attack. In essence, it ...
Haibin Sun, John C. S. Lui, David K. Y. Yau
CN
2006
82views more  CN 2006»
13 years 11 months ago
Event-condition-action rules on RDF metadata in P2P environments
RDF is one of the technologies proposed to realise the vision of the Semantic Web and it is being increasingly used in distributed web-based applications. The use of RDF in applic...
George Papamarkos, Alexandra Poulovassilis, Peter ...
CN
2006
106views more  CN 2006»
13 years 11 months ago
Efficient large-scale BGP simulations
Simulation has been the method of choice for analyzing large, complex, and highly volatile systems. One of these systems is the inter-domain routing infrastructure of the Internet...
Xenofontas A. Dimitropoulos, George F. Riley
CN
2006
86views more  CN 2006»
13 years 11 months ago
Stochastic analysis of packet-pair probing for network bandwidth estimation
In this paper, we perform a stochastic analysis of the packet-pair technique, which is a widely used method for estimating the network bandwidth in an end-to-end manner. There has...
Kyung-Joon Park, Hyuk Lim, Chong-Ho Choi
CN
2006
92views more  CN 2006»
13 years 11 months ago
Methods for comparing rankings of search engine results
Judit Bar-Ilan, Mazlita Mat-Hassan, Mark Levene