Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
ISCC
2005
IEEE
10 years 8 months ago
The Impact of Network and Protocol Heterogeneity on Real-Time Application QoS
We evaluate the impact of network, and protocol heterogeneity on real-time application performance. We focus on TCP and UDP supportive role, also in the context of network stabili...
Panagiotis Papadimitriou, Vassilis Tsaoussidis, So...
ISCC
2005
IEEE
10 years 8 months ago
An Optically Controlled Module for Wavelength Conversion Circuits
We report an innovative solely optical architecture to implement the centralized wavelength conversion module of the CWC (Controlled Wavelength Conversion) protocol [1]. The propo...
Georgios I. Papadimitriou, Amalia N. Miliou, Andre...
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
10 years 8 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
ISCC
2005
IEEE
10 years 8 months ago
Location Dependent Digital Rights Management
In this paper we present a concept and an architecture for a location dependent Digital Rights Management system. The solution is based on a trusted hardware which incorporates th...
Thomas Mundt
ISCC
2005
IEEE
10 years 8 months ago
Link Triggers Assisted Optimizations for Mobile IPv4/v6 Vertical Handovers
This document describes a mechanism that enhances Mobile IP protocols to smoothly manage handovers for Mobile Nodes equipped with multiple interfaces and moving across different l...
Nicolas Montavont, Eric Njedjou, Franck Lebeugle, ...
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
10 years 8 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
ISCC
2005
IEEE
10 years 8 months ago
Optimal Delay-Constrained Minimum Cost Loop Algorithm for Local Computer Network
This study deals with the Delay-Constrained Minimum Cost Loop Problem (DC-MCLP) of finding several loops from a source node. The DC-MCLP consists of finding a set of minimum cost ...
Yong-Jin Lee, Mohammed Atiquzzaman
ISCC
2005
IEEE
179views Communications» more  ISCC 2005»
10 years 8 months ago
Micro Mobile MPLS: A New Scheme for Micro-mobility Management in 3G All-IP Networks
This article presents the Micro Mobile MPLS scheme, which is a new proposal for IP local mobility in wireless MPLS access networks. Our proposal is based on multiprotocol label sw...
Rami Langar, Samir Tohmé, Gwendal Le Grand
ISCC
2005
IEEE
10 years 8 months ago
A Game Theoretic Analysis of Protocols Based on Fountain Codes
In this paper we analyze a novel paradigm of reliable communications which is not based on the traditional timeout-and-retransmit mechanism of TCP. Our approach, which we call FBP...
Luis López, Antonio Fernández, Vicen...
books