Sciweavers

636 search results - page 58 / 128
» Computer Networking and Internet Protocols: A Comprehensive ...
Sort
View
ICOIN
2007
Springer
15 years 4 months ago
Inter-Domain Access Volume Model: Ranking Autonomous Systems
Exploring topological structure at Autonomous System (AS) level is indispensable for understanding most issues in Internet services. Previous models of AS graph involve address or ...
Yixuan Wang, Ye Wang, Maoke Chen, Xing Li
NOSSDAV
2004
Springer
15 years 3 months ago
An adaptive multiple retransmission technique for continuous media streams
Retransmission can be used for loss recovery in continuous media applications but the number of retransmission attempts is bounded by the size of the playout buffer. For efficient...
Rishi Sinha, Christos Papadopoulos
MSWIM
2004
ACM
15 years 3 months ago
Experimental evaluation of wireless simulation assumptions
All analytical and simulation research on ad hoc wireless networks must necessarily model radio propagation using simplifying assumptions. Although it is tempting to assume that a...
David Kotz, Calvin C. Newport, Robert S. Gray, Jas...
WWW
2008
ACM
15 years 10 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
JOCN
2011
66views more  JOCN 2011»
14 years 4 months ago
The Packet Switching Brain
■ The computer metaphor has served brain science well as a tool for comprehending neural systems. Nevertheless, we propose here that this metaphor be replaced or supplemented by...
Daniel J. Graham, Daniel N. Rockmore