Sciweavers

CN
2008
62views more  CN 2008»
13 years 11 months ago
TMCP: Two-layer multicast communication protocol for Bluetooth radio networks
Chao-Tsun Chang, Chih-Yung Chang, Sheng-Wen Chang
CN
2008
126views more  CN 2008»
13 years 11 months ago
Graph transformation approaches for diverse routing in shared risk resource group (SRRG) failures
Failure resilience is a desired feature of the Internet. Most traditional restoration architectures assume single-failure assumption, which is not adequate in present day WDM opti...
Pallab Datta, Arun K. Somani
CN
2008
73views more  CN 2008»
13 years 11 months ago
Resilient network admission control
Network admission control (NAC) limits the traffic in a network to avoid overload and to assure thereby the quality of service (QoS) for admitted flows. Overload may occur due to ...
Michael Menth, Stefan Kopf, Joachim Charzinski, Ka...
CN
2008
100views more  CN 2008»
13 years 11 months ago
An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games
In recent years, massively multiplayer online games (MMOGs) have become very popular by providing more entertainment and sociability than single-player games. In order to prevent c...
Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang
CN
2008
100views more  CN 2008»
13 years 11 months ago
Packet forwarding with source verification
Abstract-- Routers in the Internet do not perform any verification of the source IP address contained in the packets, leading to the possibility of IP spoofing. The lack of such ve...
Craig A. Shue, Minaxi Gupta, Matthew P. Davy
CN
2008
80views more  CN 2008»
13 years 11 months ago
Practical large-scale latency estimation
We present the implementation of a large-scale latency estimation system based on GNP and incorporated into the Google content delivery network. Our implementation does not rely o...
Michal Szymaniak, David L. Presotto, Guillaume Pie...
CN
2008
127views more  CN 2008»
13 years 11 months ago
Decentralized detection of global threshold crossings using aggregation trees
The timely detection that a monitored variable has crossed a given threshold is a fundamental requirement for many network management applications. A challenge is the detection of ...
Fetahi Wuhib, Mads Dam, Rolf Stadler
CN
2008
86views more  CN 2008»
13 years 11 months ago
Enhanced bulk scheduling for supporting delay sensitive streaming applications
Providing end-to-end delay guarantees for delay sensitive applications is an important packet scheduling issue with routers. In this paper, to support end-to-end delay requirement...
Yung-Cheng Tu, Meng Chang Chen, Yeali S. Sun, Wei ...
CN
2008
77views more  CN 2008»
13 years 11 months ago
Approximate analysis of LRU in the case of short term correlations
Antonis Panagakis, Athanasios Vaios, Ioannis Stavr...