Sciweavers

COMCOM
2000
57views more  COMCOM 2000»
13 years 4 months ago
A distance-vector routing protocol for networks with unidirectional links
We proposea simple distance-vectorprotocolfor routingin networkshavingunidirectional links. The protocol can be seen as an adaptation for these networks of the strategy as used in...
Francis Chi-Moon Lau, Guihai Chen, Hao Huang, Li X...
COMCOM
2000
126views more  COMCOM 2000»
13 years 4 months ago
Charging for packet-switched network communication - motivation and overview
Packet-switched network technology is expected to form the integration layer for future multi-service networks. The trend to integrate voice and data traffic can already be observe...
Martin Karsten, Jens Schmitt, Burkhard Stiller, La...
COMCOM
2000
95views more  COMCOM 2000»
13 years 4 months ago
Protocols and architecture for managing TCP/IP network infrastructures
With their increased power and versatility, today's computer networks are becoming used for an ever-growing number of diverse applications. Further, the networking structures...
A. King, R. Hunt
COMCOM
2000
95views more  COMCOM 2000»
13 years 4 months ago
Countermeasures for mobile agent security
: Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in...
Wayne A. Jansen
COMCOM
2000
105views more  COMCOM 2000»
13 years 4 months ago
Security broker for multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
Aura Ganz, Se Hyun Park, Zvi Ganz
COMCOM
2000
96views more  COMCOM 2000»
13 years 4 months ago
A routing algorithm for dynamic multicast trees with end-to-end path length control
The new Path Length Control (PLC) algorithm establishes and maintains multicast trees which maximize the bandwidth to be shared by multiple receivers and which satisfy the maximum...
Hiroshi Fujinoki, Kenneth J. Christensen
COMCOM
2000
96views more  COMCOM 2000»
13 years 4 months ago
Bifurcated-M routing for multi-point videoconferencing
Dynamic routing, if properly designed, can increase the throughput of a network. In this paper, we formulate a traffic model for multi-point videoconferencing in a VP-based ATM ne...
Gang Feng, Tak-Shing Peter Yum
COMCOM
2000
148views more  COMCOM 2000»
13 years 4 months ago
Advanced service provisioning based on mobile agents
Service provisioning is currently a challenging issue to offer future telecommunication services efficiently and at the same time in a flexible and user friendly manner. As a cont...
Peyman Farjami, Carmelita Görg, Frank Bell
COMCOM
2000
90views more  COMCOM 2000»
13 years 4 months ago
Randomization enhanced Chaum's blind signature scheme
Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh
COMCOM
2000
125views more  COMCOM 2000»
13 years 4 months ago
On object initialization in the Java bytecode
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...
Stephane Doyon, Mourad Debbabi