Sciweavers

Share
NETWORKING
1993
8 years 9 months ago
The Ambivalence of Network Visibility in an Organizational Context
: We argue that technical features which make aspects of computer network visible can have ambivalent effects for the users. On the one hand they support cooperation among the user...
Volker Wulf, Anja Hartmann
NETWORKING
2000
8 years 9 months ago
Threshold-Based Registration (TBR) in Mobile IPv6
The underlying principles of IETF Internet Draft, Mobility Support in IPv6, make it possible to employ some mechanisms to improve handoff smoothness, to maintain optimized data tra...
Linfeng Yang, Jouni Karvo, Teemu Tynjälä...
NETWORKING
2000
8 years 9 months ago
Network-Driven Layered Multicast with IPv6
Receiver-driven Layered Multicast (RLM) has previously been proposed to distribute video over the best-effort heterogeneous IP networks. Although RLM can avoid network overloading ...
Ho-pong Sze, Soung C. Liew
NETWORKING
2000
8 years 9 months ago
A Reliable Subcasting Protocol for Wireless Environments
This paper presents an end-to-end reliable multicast protocol for use in environments with wireless access. It divides a multicast tree into sub-trees where subcasting within these...
Djamel Fawzi Hadj Sadok, Carlos de M. Cordeiro, Ju...
NETWORKING
2000
8 years 9 months ago
Computing Blocking Probabilities in Multi-class Wavelength Routing Networks
We present an approximate analytical method to compute efficiently the call blocking probabilities in wavelength routing networks with multiple classes of calls. The model is fairl...
Sridhar Ramesh, George N. Rouskas, Harry G. Perros
NETWORKING
2000
8 years 9 months ago
An Interworking Call Control Solution for a Multidiscipline Switch
The development of multimedia services is pushing networking technologies towards broadband solutions. A lot of research and development effort has been spent on finding a universa...
Pertti Raatikainen, Sami Raatikainen
NETWORKING
2000
8 years 9 months ago
Survivability Analysis of Ad Hoc Wireless Network Architecture
Mobile ad hoc wireless networks are generating novel interests in mobile computing. The dynamism in network topology has thrown up multifarious issues, requiring a fresh look into ...
Krishna Paul, Romit Roy Choudhury, Somprakash Band...
NETWORKING
2000
8 years 9 months ago
Sensitivity of ABR Congestion Control Algorithms to Hurst Parameter Estimates
Optimal linear predictors can be utilised in ABR control algorithms for the management of self-similar network traffic. However, estimates of the Hurst parameter are required to ge...
Sven A. M. Östring, Harsha Sirisena, Irene Hu...
NETWORKING
2000
8 years 9 months ago
An Exact Algorithm for Calculating Blocking Probabilities in Multicast Networks
Abstract. The paper deals with tree-structured point-to-multipoint networks, where users from infinite user populations at the leaf nodes subscribe to a variety of channels, offere...
Eeva Nyberg, Jorma T. Virtamo, Samuli Aalto
books