Sciweavers

537 search results - page 63 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
ICN
2005
Springer
15 years 3 months ago
Load Distribution Performance of the Reliable Server Pooling Framework
Abstract. The Reliable Server Pooling (RSerPool) protocol suite currently under standardization by the IETF is designed to build systems providing highly available services by prov...
Thomas Dreibholz, Erwin P. Rathgeb, Michael Tü...
CCS
2003
ACM
15 years 3 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
ICC
2007
IEEE
128views Communications» more  ICC 2007»
15 years 4 months ago
Delay and Power Efficient Voice Transmission over MANET
: Increasing speed of hardware device and versatile functionalities of small equipments e.g. laptop, PDA etc. are introducing various voice oriented applications with mobility. Lik...
Md. Golam Kaosar, Tarek R. Sheltami, Ashraf S. Has...
TC
2010
14 years 8 months ago
Stateless Multicasting in Mobile Ad Hoc Networks
—There are increasing interest and big challenge in designing a scalable and robust multicast routing protocol in a mobile ad hoc network (MANET) due to the difficulty in group ...
Xiaojing Xiang, Xin Wang, Yuanyuan Yang
AAAI
2008
15 years 6 days ago
Semantical Considerations on Dialectical and Practical Commitments
This paper studies commitments in multiagent systems. A dialectical commitment corresponds to an agent taking a position about a putative fact, including for the sake of argument....
Munindar P. Singh