Sciweavers

94 search results - page 17 / 19
» Admission control in data transfers over lightpaths
Sort
View

Publication
165views
15 years 3 months ago
A Survey of the Use-It-Or-Lose-It Policies for the ABR Service in ATM Networks
The Available Bit Rate (ABR) service has been developed to support data applications over Asynchronous Transfer Mode (ATM). The ABR service uses a closed-loop rate-based traffic ma...
Shivkumar Kalyanaraman, Raj Jain, Rohit Goyal, Son...
INTERACT
2003
13 years 7 months ago
Proximal Interactions: A Direct Manipulation Technique for Wireless Networking
As a number of networked digital devices are ubiquitously used, control of inter-device communications becomes a complicated task. People can no longer keep track of all the device...
Jun Rekimoto, Yuji Ayatsuka, Michimune Kohno, Haru...
CORR
2008
Springer
140views Education» more  CORR 2008»
13 years 4 months ago
Steganography of VoIP streams
The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing exis...
Wojciech Mazurczyk, Krzysztof Szczypiorski
WICOMM
2011
13 years 21 days ago
Multi-channel power-controlled directional MAC for wireless mesh networks
Wireless Mesh Networks (WMNs) have emerged recently as a technology for providing high-speed last mile connectivity in next-generation wireless networks. Several MAC protocols tha...
Fabio Martignon
STORAGESS
2006
ACM
13 years 11 months ago
Scalable security for large, high performance storage systems
New designs for petabyte-scale storage systems are now capable of transferring hundreds of gigabytes of data per second, but lack strong security. We propose a scalable and effici...
Andrew W. Leung, Ethan L. Miller