Sciweavers

1639 search results - page 255 / 328
» Degree-constrained network flows
Sort
View
130
Voted
ICISC
1998
132views Cryptology» more  ICISC 1998»
15 years 2 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
CCR
2006
103views more  CCR 2006»
15 years 21 days ago
A distributed traffic control scheme based on edge-centric resource management
The correct admission of flows in the Differentiated Services (DiffServ) environment is critical to provide stable and predictable quality of service (QoS) to the end user. Withou...
Yingxin Jiang, Aaron Striegel
110
Voted
CCR
2006
96views more  CCR 2006»
15 years 21 days ago
XCP for shared-access multi-rate media
The eXplicit Control Protocol (XCP) was developed to overcome some of the limitations of TCP, such as low utilization in high bandwidth delay product networks, unstable throughput...
Filipe Abrantes, Manuel Ricardo
96
Voted
CN
2006
75views more  CN 2006»
15 years 21 days ago
Dynamic online QoS routing schemes: Performance and bounds
Several dynamic QoS routing techniques have been recently proposed for new IP networks based on label forwarding. However, no extensive performance evaluation and comparison is av...
Antonio Capone, Luigi Fratta, Fabio Martignon
101
Voted
COMCOM
2006
110views more  COMCOM 2006»
15 years 21 days ago
MULTI+: A robust and topology-aware peer-to-peer multicast service
TOPLUS is a lookup service for structured peer-to-peer networks that is based on the hierarchical grouping of peers according to network IP prefixes. In this paper we present MULT...
Luis Garcés-Erice, Ernst W. Biersack