Sciweavers

COMCOM
2006
98views more  COMCOM 2006»
13 years 11 months ago
On the fairness of dynamic bandwidth allocation schemes in Ethernet passive optical networks
Ethernet passive optical networks (EPONs) technology has emerged as a promising candidate for next-generation broadband access networks. As this technology evolves, the developmen...
Xiaofeng Bai, Abdallah Shami, Chadi Assi
COMCOM
2006
76views more  COMCOM 2006»
13 years 11 months ago
MultiGate6: An IPv6 multihoming gateway using a hybrid approach
Chung-ming Huang, Ching-hsien Tsai, Po-chou Su
COMCOM
2006
120views more  COMCOM 2006»
13 years 11 months ago
On the impact of loss and delay variation on Internet packet audio transmission
The quality of audio in IP telephony is significantly influenced by various factors, including type of encoder, delay, delay variation, rate and distribution of packet loss, and t...
Lopamudra Roychoudhuri, Ehab S. Al-Shaer, Gregory ...
COMCOM
2006
188views more  COMCOM 2006»
13 years 11 months ago
Dynamic bandwidth allocation for QoS routing on TDMA-based mobile ad hoc networks
The paper proposes several dynamic bandwidth allocation strategies for QoS routing on TDMA-based mobile ad hoc networks. Comprehensively, these strategies are called a distributed...
Kuei-Ping Shih, Chih-Yung Chang, Yen-Da Chen, Tsun...
COMCOM
2006
110views more  COMCOM 2006»
13 years 11 months ago
Localized routing with guaranteed delivery and a realistic physical layer in wireless sensor networks
Routing is the problem of sending a packet from a source node to a destination node in the network. Existing solutions for sensor networks assume a unit disk graph model, where me...
Milos Stojmenovic, Amiya Nayak
COMCOM
2006
56views more  COMCOM 2006»
13 years 11 months ago
Retransmission policies for multihomed transport protocols
Abstract-- We evaluate three retransmission policies for transport protocols that support multihoming (e.g., SCTP). The policies dictate whether retransmissions are sent to the sam...
Armando L. Caro Jr., Paul D. Amer, Randall R. Stew...
COMCOM
2006
88views more  COMCOM 2006»
13 years 11 months ago
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
To defend against multi-step intrusions in high-speed networks, efficient algorithms are needed to correlate isolated alerts into attack scenarios. Existing correlation methods us...
Lingyu Wang, Anyi Liu, Sushil Jajodia
COMCOM
2006
78views more  COMCOM 2006»
13 years 11 months ago
Personalization of internet telephony services for presence with SIP and extended CPL
This paper discusses issues of personalization of presence services in the context of Internet Telephony. Such services take into consideration the willingness and ability of a use...
Dongmei Jiang, Ramiro Liscano, Luigi Logrippo
COMCOM
2006
138views more  COMCOM 2006»
13 years 11 months ago
Reducing memory fragmentation in network applications with dynamic memory allocators optimized for performance
The needs for run-time data storage in modern wired and wireless network applications are increasing. Additionally, the nature of these applications is very dynamic, resulting in ...
Stylianos Mamagkakis, Christos Baloukas, David Ati...
COMCOM
2006
85views more  COMCOM 2006»
13 years 11 months ago
Seamless continuity of PS-services in WLAN/3G interworking
Paulo Pinto, Luis Bernardo, Pedro Sobral