Sciweavers

3751 search results - page 572 / 751
» Events in security protocols
Sort
View
90
Voted
CCR
2004
84views more  CCR 2004»
15 years 20 days ago
On making SCTP robust to spurious retransmissions
Network anomalies such as packet reordering and delay spikes can result in spurious retransmissions and degrade performance of reliable transport protocols such as TCP and SCTP. P...
Sourabh Ladha, Stephan Baucke, Reiner Ludwig, Paul...
140
Voted
CJ
2002
122views more  CJ 2002»
15 years 19 days ago
Java for On-line Distributed Monitoring of Heterogeneous Systems and Services
monitoring indicators at different levels of abstraction. At the application level, it instruments the Java Virtual Machine (JVM) to notify several different types of events trigge...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
113
Voted
CN
2002
195views more  CN 2002»
15 years 18 days ago
A simulation study of the OSPF-OMP routing algorithm
Open shortest path first (OSPF) is the most widely used internal gateway routing protocol on the Internet. However, one shortcoming is that it does not take advantage of the exist...
G. Michael Schneider, Tamás Németh
143
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
Distributed Algorithms for Approximating Wireless Network Capacity
—In this paper we consider the problem of maximizing wireless network capacity (a.k.a. one-shot scheduling) in both the protocol and physical models. We give the first distribut...
Michael Dinitz
105
Voted
AVSS
2006
IEEE
15 years 6 months ago
Multi-view Intelligent Vehicle Surveillance System
This paper presents a multi-view intelligent surveillance system used for the automatic tracking and monitoring of vehicles in a short-term parking lane. The system has the abilit...
Simon Denman, Clinton Fookes, Jamie Cook, Chris Da...