Sciweavers

33 search results - page 6 / 7
» itiis 2008
Sort
View
ITIIS
2008
135views more  ITIIS 2008»
13 years 5 months ago
NJ+: An Efficient Congestion Control Mechanism for Wireless Networks
Transmission control protocols have to overcome common problems in wireless networks. TCP employing both packet loss discrimination mechanism and available bandwidth estimation al...
Jaehyung Lee, Jungrae Kim, Minu Park, Jahwan Koo, ...
ITIIS
2008
135views more  ITIIS 2008»
13 years 5 months ago
Enhanced Pulse Protocol RFID Reader Anti-collision Algorithm using Slot Occupied Probability in Dense Reader Environment
The Radio Frequency IDentification (RFID) system is a contactless automatic identification system, which comprises readers and tags. In RFID systems, a reader collision occurs whe...
InChan Song, Xiao Fan, KyungHi Chang
ITIIS
2008
128views more  ITIIS 2008»
13 years 5 months ago
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they ...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
ITIIS
2010
137views more  ITIIS 2010»
13 years 3 months ago
Improving the Availability of Scalable on-demand Streams by Dynamic Buffering on P2P Networks
In peer-to-peer (P2P) on-demand streaming networks, the alleviation of server load depends on reciprocal stream sharing among peers. In general, on-demand video services enable cl...
Chow-Sing Lin
ITIIS
2010
172views more  ITIIS 2010»
13 years 3 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li