Sciweavers

ISCC
2003
IEEE
14 years 5 months ago
Controlling Bursts in Best-effort Routers for Flow Isolation
In today’s Internet a user can be adversely affected by other users that overload the router. To address this problem, routers need to provide flow isolation. In this paper, we...
Miguel A. Ruiz-Sánchez, Walid Dabbous
ISCC
2003
IEEE
131views Communications» more  ISCC 2003»
14 years 5 months ago
A Client-based Handoff Mechanism for Mobile IPv6 Wireless Networks
Mobile IP enables mobile computers to roam transparently in any network. However, the current proposed protocol specification does not support a suitable handoff mechanism to all...
Leo Patanapongpibul, Glenford E. Mapp
ISCC
2003
IEEE
130views Communications» more  ISCC 2003»
14 years 5 months ago
Balanced Batch LKH: New Proposal, Implementation and Performance Evaluation
Perfect Secrecy can only be achieved in multicast groups by ciphering data sent to the group with a different key every time a member joins or leaves the group. A Key Server must ...
Josep Pegueroles, Francisco Rico-Novella
ISCC
2003
IEEE
123views Communications» more  ISCC 2003»
14 years 5 months ago
Multicast Congestion Control for Multimedia Collaborative Applications in Packet Switched Networks
We investigate the problem of congestion control for multicast traffic over datagram packet switched networks and present an end-to-end solution to it. The focus of our study is o...
Emad Eldin Mohamed, Hussein M. Abdel-Wahab
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
14 years 5 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
ISCC
2003
IEEE
14 years 5 months ago
On the Issues of IP Traceback for IPv6 and Mobile IPv6
As the Internet becomes pervasive, the vulnerability of some fundamental design aspects of the Internet has also become significant. Among which, Denial-of-Service (DoS) and Distr...
Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi...
ISCC
2003
IEEE
14 years 5 months ago
Tau-AIMD for Asynchronous Receiver Feedback
Adrian Lahanas, Vassilios Tsaoussidis
ISCC
2003
IEEE
122views Communications» more  ISCC 2003»
14 years 5 months ago
AMCA: an Active-based Multicast Congestion Avoidance Algorithm
Many works have recently addressed the issue of congestion control for multicast communications and the problem is known to be highly complex. Scalability, responsiveness, stabili...
Moufida Maimour, CongDuc Pham
ISCC
2003
IEEE
135views Communications» more  ISCC 2003»
14 years 5 months ago
High Performance Routing in a LEO Satellite Network
Satellite systems are designed as a backup system to the existing land based wireless systems. Because of the global coverage of the system it becomes more economic for the rural ...
Roy Kucukates, Cem Ersoy
ISCC
2003
IEEE
138views Communications» more  ISCC 2003»
14 years 5 months ago
Connectivity Aware Routing - a Method for Finding Bandwidth Constrained Paths Over a Variety of Network Topologies
Multimedia traffic and real-time e-commerce applications can experience quality degradation in traditional networks such as the Internet. These difficulties can be overcome in n...
Karol Kowalik, Martin Collier