Sciweavers

CN
2007
122views more  CN 2007»
13 years 11 months ago
Impact of mobility on the performance of relaying in ad hoc networks - Extended version
— We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly diffe...
Ahmad Al Hanbali, Arzad Alam Kherani, Robin Groene...
CN
2007
111views more  CN 2007»
13 years 11 months ago
Advances in smart cards
Since the turn of the century, smart card technology has pushed its borders both on the high end to integrate new functionalities (e.g., networking) and on the low end to adapt to...
Josep Domingo-Ferrer, Joachim Posegga, Francesc Se...
CN
2007
146views more  CN 2007»
13 years 11 months ago
TCP self-clocking and bandwidth sharing
— We propose a simple queueing model for TCP transfers sharing a bottleneck link and examine its behavior when the buffer at the bottleneck is large compared to the bandwidth-del...
Allen B. Downey
CN
2007
146views more  CN 2007»
13 years 11 months ago
Autonomic control and personalization of a wireless access network
As ICT services are becoming more ubiquitous and mobile and access technologies grow to be more heterogeneous and complex, we are witnessing the increasing importance of two relat...
Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femm...
CN
2007
93views more  CN 2007»
13 years 11 months ago
UDT: UDP-based data transfer for high-speed wide area networks
In this paper, we summarize our work on the UDT high performance data transport protocol in the past four years. UDT was designed to effectively utilize the rapidly emerging high-...
Yunhong Gu, Robert L. Grossman
CN
2007
106views more  CN 2007»
13 years 11 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
CN
2007
65views more  CN 2007»
13 years 11 months ago
Performance analysis of a client-side caching/prefetching system for Web traffic
Abdullah Balamash, Marwan Krunz, Philippe Nain
CN
2007
99views more  CN 2007»
13 years 11 months ago
Design and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
CN
2007
168views more  CN 2007»
13 years 11 months ago
A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN
— Energy efficient operation is of paramount importance for battery-powered wireless nodes. In an effort to conserve energy, standard protocols for WLANs have the provision for w...
Mahasweta Sarkar, Rene L. Cruz