Sciweavers

537 search results - page 37 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
JSAC
2006
152views more  JSAC 2006»
14 years 10 months ago
A Distributed End-to-End Reservation Protocol for IEEE 802.11-Based Wireless Mesh Networks
Abstract--This paper presents an end-to-end reservation protocol for quality-of-service (QoS) support in the medium access control layer of wireless multihop mesh networks. It rese...
E. Carlson, Christian Prehofer, Christian Bettstet...
DAGM
2004
Springer
15 years 3 months ago
Features for Image Retrieval: A Quantitative Comparison
Abstract. In this paper, different well-known features for image retrieval are quantitatively compared and their correlation is analyzed. We compare the features for two differen...
Thomas Deselaers, Daniel Keysers, Hermann Ney
CCR
2004
100views more  CCR 2004»
14 years 9 months ago
A real options framework to value network, protocol, and service architecture
This paper proposes a real options framework for evaluating architectural choices and the economic value of these alternative choices of networks, protocols, and services. Using p...
Mark Gaynor, Scott Bradner
ICALP
2005
Springer
15 years 3 months ago
Computationally Sound Implementations of Equational Theories Against Passive Adversaries
In this paper we study the link between formal and cryptographic models for security protocols in the presence of a passive adversary. In contrast to other works, we do not conside...
Mathieu Baudet, Véronique Cortier, Steve Kr...
ETM
2010
257views Economy» more  ETM 2010»
14 years 11 months ago
Implementation and Performance Evaluation of the re-ECN Protocol
Re-inserted ECN (re-ECN) is a proposed TCP/IP extension that informs the routers on a path about the estimated level of congestion. The re-ECN protocol extends the Explicit Congest...
Mirja Kühlewind, Michael Scharf