Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
COMCOM
1998
98views more  COMCOM 1998»
11 years 9 months ago
IP multicast group management for point-to-point local distribution
—We examine the applicability of existing IP multicast mechanisms for Point-to-Point links such as wired and wireless telephone lines. We identify problems such as overhead due t...
George Xylomenos, George C. Polyzos
COMCOM
1998
83views more  COMCOM 1998»
11 years 9 months ago
System for screening objectionable images
As computers and Internet become more and more available to families, access of objectionable graphics by children is increasingly a problem that many parents are concerned about....
James Ze Wang, Jia Li, Gio Wiederhold, Oscar Firsc...
COMCOM
1998
81views more  COMCOM 1998»
11 years 9 months ago
Secure broadcasting in large networks
In this note, we show that a proposed secure broadcasting scheme is insecure. We also present a modified scheme to overcome this weakness. The modified scheme has the extra adva...
Hung-Min Sun, Shiuh-Pyng Shieh
COMCOM
1998
106views more  COMCOM 1998»
11 years 9 months ago
Algorithms for delay-constrained low-cost multicast tree construction
With the proliferation of multimedia group applications, the construction of multicast trees satisfying Quality of Service QoS requirements is becoming a problem of prime import...
R. Sriram, Govindarasu Manimaran, C. Siva Ram Murt...
COMCOM
1998
102views more  COMCOM 1998»
11 years 9 months ago
Preferred link based delay-constrained least-cost routing in wide area networks
Multimedia applications involving digital audio and/or digital video transmissions require strict QoS constraints (end-to-end delay bound, bandwidth availability, packet loss rate...
R. Sriram, Govindarasu Manimaran, C. Siva Ram Murt...
COMCOM
1998
117views more  COMCOM 1998»
11 years 9 months ago
Specification, validation, and verification of time-critical systems
In this paper, we propose a new formalism, named the Timed Communicating Finite State Machine (Timed CFSM), for specifying and verifying time-critical systems. Timed CFSM preserve...
Shiuh-Pyng Shieh, Jun-Nan Chen
COMCOM
1998
83views more  COMCOM 1998»
11 years 9 months ago
The design of the TAO real-time object request broker
Many real-time application domains can benefit from flexible and open distributed architectures, such as those defined by the CORBA specification. CORBA is an architecture for...
Douglas C. Schmidt, David L. Levine, Sumedh Mungee
COMCOM
1998
95views more  COMCOM 1998»
11 years 9 months ago
Correlation properties of the token leaky bucket departure process
In this paper we focus on the behavior of the token leaky bucket mechanism with respect to second-order statistics of the departure process under various correlated cell arrival a...
Kenneth Mitchell, Appie van de Liefvoort, Jerry Pl...
COMCOM
1998
87views more  COMCOM 1998»
11 years 9 months ago
Design and analysis of an efficient and reliable atomic multicast protocol
Weijia Jia, Jiannong Cao, Xiaohua Jia, Chan H. Lee
COMCOM
1998
57views more  COMCOM 1998»
11 years 9 months ago
Experimental platform for telecommunication resource management
István Cselényi, Róbert Szab&...
books