Sciweavers

537 search results - page 15 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
PEWASUN
2004
ACM
15 years 3 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
ICC
2009
IEEE
106views Communications» more  ICC 2009»
15 years 4 months ago
Distributed ECN-Based Congestion Control
—Following the design philosophy of XCP, VCP is a router-assisted congestion protocol that intends to balance the efficiency and the fairness control in high Bandwidth-Delay Pro...
Xiaolong Li, Homayoun Yousefi'zadeh
DEXAW
2000
IEEE
116views Database» more  DEXAW 2000»
15 years 2 months ago
Analyzing Requirements Engineering Processes: A Case Study
Thorough process improvement starts with an analysis of the current situation. This is also true for requirements engineering processes. The goal of cooperation between DaimlerChq...
Frank Houdek, Klaus Pohl
ICPADS
2007
IEEE
15 years 4 months ago
A semantic overlay network for unstructured peer-to-peer protocols
Peer-to-Peer computing has become a popular networking paradigm for file sharing, distributed computing, collaborative working, etc. The widely used unstructured Peer-to-Peer pro...
Junfeng Xie, Zhenhua Li, Guihai Chen
ASWEC
2006
IEEE
15 years 3 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...