Sciweavers

ISCC
2005
IEEE
14 years 2 months ago
Location Dependent Digital Rights Management
In this paper we present a concept and an architecture for a location dependent Digital Rights Management system. The solution is based on a trusted hardware which incorporates th...
Thomas Mundt
ISCC
2005
IEEE
14 years 2 months ago
Link Triggers Assisted Optimizations for Mobile IPv4/v6 Vertical Handovers
This document describes a mechanism that enhances Mobile IP protocols to smoothly manage handovers for Mobile Nodes equipped with multiple interfaces and moving across different l...
Nicolas Montavont, Eric Njedjou, Franck Lebeugle, ...
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
14 years 2 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
ISCC
2005
IEEE
14 years 2 months ago
Optimal Delay-Constrained Minimum Cost Loop Algorithm for Local Computer Network
This study deals with the Delay-Constrained Minimum Cost Loop Problem (DC-MCLP) of finding several loops from a source node. The DC-MCLP consists of finding a set of minimum cost ...
Yong-Jin Lee, Mohammed Atiquzzaman
ISCC
2005
IEEE
179views Communications» more  ISCC 2005»
14 years 2 months ago
Micro Mobile MPLS: A New Scheme for Micro-mobility Management in 3G All-IP Networks
This article presents the Micro Mobile MPLS scheme, which is a new proposal for IP local mobility in wireless MPLS access networks. Our proposal is based on multiprotocol label sw...
Rami Langar, Samir Tohmé, Gwendal Le Grand
ISCC
2005
IEEE
14 years 2 months ago
A Game Theoretic Analysis of Protocols Based on Fountain Codes
In this paper we analyze a novel paradigm of reliable communications which is not based on the traditional timeout-and-retransmit mechanism of TCP. Our approach, which we call FBP...
Luis López, Antonio Fernández, Vicen...
ISCC
2005
IEEE
119views Communications» more  ISCC 2005»
14 years 2 months ago
A Systematic Approach to Building High Performance Software-Based CRC Generators
—A framework for designing a family of novel fast CRC generation algorithms is presented. Our algorithms can ideally read arbitrarily large amounts of data at a time, while optim...
Michael E. Kounavis, Frank L. Berry
ISCC
2005
IEEE
104views Communications» more  ISCC 2005»
14 years 2 months ago
Bandwidth Guaranteed Routing for Ad Hoc Networks with Interference Consideration
The problem of computing bandwidth guaranteed paths for given flow requests in an ad-hoc network is complicated because neighboring links share the medium. We define the path wi...
Zhanfeng Jia, Rajarshi Gupta, Jean C. Walrand, Pra...
ISCC
2005
IEEE
14 years 2 months ago
Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing
Jiejun Kong, Xiaoyan Hong, M. Y. Sanadidi, Mario G...