Sciweavers

CN
2004
75views more  CN 2004»
13 years 4 months ago
Component coordination: a telecommunication case study
Pamela Zave, Healfdene Goguen, Thomas M. Smith
CN
2004
85views more  CN 2004»
13 years 4 months ago
The multicast address allocation problem: theory and practice
Abstract-- In this paper, we perform the first comprehensive study of the multicast address allocation problem. We analyze this problem both within its context as a classic resourc...
Daniel Zappala, Virginia Mary Lo, Chris GauthierDi...
CN
2004
122views more  CN 2004»
13 years 4 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee
CN
2004
94views more  CN 2004»
13 years 4 months ago
Call blocking probabilities in a traffic-groomed tandem optical network
Alicia Nicki Washington, Harry G. Perros
CN
2004
148views more  CN 2004»
13 years 4 months ago
Multiway range trees: scalable IP lookup with fast updates
In this paper, we introduce a new IP lookup scheme with worst-case search and update time of O(log n), where n is the number of prefixes in the forwarding table. Our scheme is base...
Priyank Ramesh Warkhede, Subhash Suri, George Varg...
CN
2004
106views more  CN 2004»
13 years 4 months ago
An overlay framework for provisioning differentiated services in Source Specific Multicast
Scalability in QoS-aware multicast deployment has become an important research dimension in recent years. In this paper we propose a new scheme named Differentiated QoS Multicast ...
Ning Wang, George Pavlou
CN
2004
82views more  CN 2004»
13 years 4 months ago
Modelling and verification of interworking between SIP and H.323
Ligang Wang 0002, Anjali Agarwal, J. William Atwoo...
CN
2004
146views more  CN 2004»
13 years 4 months ago
Spatio-temporal correlation: theory and applications for wireless sensor networks
Wireless Sensor Networks (WSN) are characterized by the dense deployment of sensor nodes that continuously observe physical phenomenon. Due to high density in the network topology...
Mehmet C. Vuran, Özgür B. Akan, Ian F. A...
CN
2004
106views more  CN 2004»
13 years 4 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...