Sciweavers

ISCC
2005
IEEE
105views Communications» more  ISCC 2005»
14 years 2 months ago
Enhanced Protection Using Shared Segment Backups in a Multiservice GMPLS-Based Networks
The paper presents a novel protection methodology for setting protected paths in a multiservice GMPLSbased network scenario. By applying the proposed methods, label switched paths...
Anna Urra, Eusebi Calle, José-Luis Marzo
ISCC
2005
IEEE
105views Communications» more  ISCC 2005»
14 years 2 months ago
The Bandwidth Exchange Architecture
New applications for the Internet such as video on demand, grid computing etc. depend on the availability of high bandwidth connections with acceptable Quality of Service (QoS). T...
David Michael Turner, Vassilis Prevelakis, Angelos...
ISCC
2005
IEEE
109views Communications» more  ISCC 2005»
14 years 2 months ago
From Mobility Management to Connectivity Management
This position paper presents the trend of the research focus transition from mobility management to connectivity management, for the emerging pervasive and ubiquitous computing pa...
Jun-Zhao Sun, Jaakko J. Sauvola
ISCC
2005
IEEE
14 years 2 months ago
A Label Space Reduction Algorithm for P2MP LSPs Using Asymmetric Tunnels
- Traffic Engineering objective is to optimize network resource utilization. Although several works have been published about minimizing network resource utilization, few works hav...
Fernando Solano, Ramón Fabregat, Yezid Dono...
ISCC
2005
IEEE
112views Communications» more  ISCC 2005»
14 years 2 months ago
Distributed Direction-Based Localization in Wireless Sensor Networks
Location awareness is an attractive research issue in the wireless sensor network (WSN). However, precise location information may be unavailable due to the constraint in energy, ...
Kuei-Ping Shih, Sheng-Shih Wang
ISCC
2005
IEEE
120views Communications» more  ISCC 2005»
14 years 2 months ago
Modular Reference Implementation of an IP-DSLAM
We describe a modular reference implementation of an IPbased DSL access multiplexer (DSLAM). We identify deployment trends and primary tasks a future DSLAM has to offer. The imple...
Christian Sauer, Matthias Gries, Sören Sonnta...
ISCC
2005
IEEE
143views Communications» more  ISCC 2005»
14 years 2 months ago
Approximating Optimal Multicast Trees in Wireless Multihop Networks
— We study the problem of computing minimal cost multicast trees in multi-hop wireless mesh networks. This problem is known as the Steiner tree problem, and it has been widely st...
Pedro M. Ruiz, Antonio F. Gómez-Skarmeta
ISCC
2005
IEEE
14 years 2 months ago
The Impact of Network and Protocol Heterogeneity on Real-Time Application QoS
We evaluate the impact of network, and protocol heterogeneity on real-time application performance. We focus on TCP and UDP supportive role, also in the context of network stabili...
Panagiotis Papadimitriou, Vassilis Tsaoussidis, So...
ISCC
2005
IEEE
14 years 2 months ago
An Optically Controlled Module for Wavelength Conversion Circuits
We report an innovative solely optical architecture to implement the centralized wavelength conversion module of the CWC (Controlled Wavelength Conversion) protocol [1]. The propo...
Georgios I. Papadimitriou, Amalia N. Miliou, Andre...
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
14 years 2 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...