Abstract—Rapid and unpredictable topology changes and resource constraints make delivering packets in a MANET (Mobile Ad hoc Network) a challenging task. Routing information has ...
—In multiservice networks, admission control (AC) is a convenient means of assuring high quality communications by safeguarding enough availability for customer traffic. This ca...
—It is critical to adapt clear and representative real world traffic properties as groundwork for the contemporary and emergent future Internet workload generation. Byte count p...
— Availability is one of the important factors to be considered for business-driven IT service management. This paper addresses the issue of analyzing what we call availability w...
Lei Xie, Jing Luo, Jie Qiu, John A. Pershing, Ying...
—We present in this paper SGNET, a distributed framework to collect information on Internet attacks, with special attention to self-propagating malware and code injections. This ...
In 3G-WLAN overlay network environments, a UE is apt to lose the WLAN signal without any notice by moving while it connects to WLAN because it can be apart from the WLAN coverage s...
Hyeyeon Kwon, Mijeong Yang, Aesoon Park, S. Venkat...
—One of the major problems due to denial of service attacks is the identification of fault packets. To resolve this problem, several IP traceback methods have been defined. In th...
Large complex systems (such as Enterprise systems) are often composed of several interacting, independent components. In many such systems, although the behavior of the constituen...
—Automatic service and application deployment and management is becoming possible through the use of service and infrastructure discovery and policy systems. But using the infras...
Robert Adams, Ricardo Rivaldo, Guilherme Germoglio...