With the emersion of new types of applications on the Internet, the need of broadband access is unavoidable. It also makes the differentiation of services provided by the network ...
Kuo-Chih Chu, Yi-Gang Tai, Wei-Tsong Lee, Pau-Choo...
Whenever handoff for a mobile user occurs in wireless ATM network, its connection must be reestablished in the new area. This paper proposes a new path rerouting scheme based on t...
Hee Yong Youn, Hee-Suk Kim, Hyunseung Choo, Sajal ...
Recent growth in cellular networks has motivated research on broadband access technologies for the support of diverse services over wireless networks. Wireless Asynchronous Transf...
Luis Villasenor-Gonzalez, Sophia Tsakiridou, Luis ...
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Abstract-- We consider the delivery of video assets over a besteffort network, possibly through a caching proxy located close to the clients generating the requests. We are interes...
This paper examines the costs and potential benefits of long-term prefetching for content distribution. In traditional short-term prefetching, caches use recent access history to ...
Arun Venkataramani, Praveen Yalagandula, Ravi Kokk...