Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
COMCOM
2002
139views more  COMCOM 2002»
10 years 2 months ago
A novel mechanism for providing service differentiation over CATV network
With the emersion of new types of applications on the Internet, the need of broadband access is unavoidable. It also makes the differentiation of services provided by the network ...
Kuo-Chih Chu, Yi-Gang Tai, Wei-Tsong Lee, Pau-Choo...
COMCOM
2002
79views more  COMCOM 2002»
10 years 2 months ago
Rerouting for handoff based on the distance in wireless ATM networks
Whenever handoff for a mobile user occurs in wireless ATM network, its connection must be reestablished in the new area. This paper proposes a new path rerouting scheme based on t...
Hee Yong Youn, Hee-Suk Kim, Hyunseung Choo, Sajal ...
COMCOM
2002
82views more  COMCOM 2002»
10 years 2 months ago
High-performance IP routing table lookup
Nowadays, the commonly used table lookup scheme for IP routing is based on the so-called classless interdomain routing (CIDR). With CIDR, routers must
Pi-Chung Wang, Chia-Tai Chan, Yaw-Chung Chen
COMCOM
2002
126views more  COMCOM 2002»
10 years 2 months ago
Performance analysis of wireless ATM/AAL2 over a burst error channel
Recent growth in cellular networks has motivated research on broadband access technologies for the support of diverse services over wireless networks. Wireless Asynchronous Transf...
Luis Villasenor-Gonzalez, Sophia Tsakiridou, Luis ...
COMCOM
2002
143views more  COMCOM 2002»
10 years 2 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt
COMCOM
2002
189views more  COMCOM 2002»
10 years 2 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
COMCOM
2002
99views more  COMCOM 2002»
10 years 2 months ago
Joint server scheduling and proxy caching for video delivery
Abstract-- We consider the delivery of video assets over a besteffort network, possibly through a caching proxy located close to the clients generating the requests. We are interes...
Olivier Verscheure, Chitra Venkatramani, Pascal Fr...
COMCOM
2002
86views more  COMCOM 2002»
10 years 2 months ago
The potential costs and benefits of long-term prefetching for content distribution
This paper examines the costs and potential benefits of long-term prefetching for content distribution. In traditional short-term prefetching, caches use recent access history to ...
Arun Venkataramani, Praveen Yalagandula, Ravi Kokk...
COMCOM
2002
69views more  COMCOM 2002»
10 years 2 months ago
A QoS-based routing algorithm for PNNI ATM networks
Although the ATM Forum has proposed the Private Network
Chen-Khong Tham, Jianning Mai, Lawrence W. C. Wong
books