Sciweavers

483 search results - page 74 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
ICC
2009
IEEE
127views Communications» more  ICC 2009»
15 years 4 months ago
A Study on Cross-Layer Multi-Constraint Path Computation for IP-Over-Optical Networks
— A powerful path computation element is a must for the next-generation IP-over-Optical networks to support ondemand service provisioning crossing layers. The main purpose of pat...
Xi Yang, Tom Lehman, Kenichi Ogaki, Tomohiro Otani
ICC
2007
IEEE
15 years 3 months ago
Locating Congested Segments on the Internet by Clustering the Delay Performance of Multiple Paths
— A practical method of locating congested segments on the Internet by periodic end-to-end packet delay measurements along multiple paths is presented. This method is a network t...
Atsuo Tachibana, Shigehiro Ano, Toru Hasegawa, Mas...
CLUSTER
1999
IEEE
14 years 9 months ago
Experimental measurements and design guidelines for real-time software encryption in multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement real time cryptographic services. In this paper we evaluate the use of software b...
Aura Ganz, Se Hyun Park, Zvi Ganz
WWW
2005
ACM
15 years 10 months ago
An enhanced model for searching in semantic portals
Semantic Portal is the next generation of web portals that are powered by Semantic Web technologies for improved information sharing and exchange for a community of users. Current...
Lei Zhang, Yong Yu, Jian Zhou, Chenxi Lin, Yin Yan...
98
Voted
ICADL
2003
Springer
145views Education» more  ICADL 2003»
15 years 2 months ago
Towards Web Mining of Query Translations for Cross-Language Information Retrieval in Digital Libraries
This paper proposes an efficient client-server-based query translation approach to allowing more feasible implementation of cross-language information retrieval (CLIR) services in ...
Wen-Hsiang Lu, Jenq-Haur Wang, Lee-Feng Chien