Sciweavers

8080 search results - page 194 / 1616
» From Computer Networks to Agent Networks
Sort
View
136
Voted
ICN
2009
Springer
15 years 1 months ago
Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits
It is essential that a monitoring system is being designed with performance and scalability in mind. But due to the diversity and complexity of both the monitoring and the monitore...
Abdelkader Lahmadi, Laurent Andrey, Olivier Festor
142
Voted
CISS
2008
IEEE
15 years 10 months ago
On wireless network scheduling with intersession network coding
Abstract—Cross-layer optimization including congestion control, routing, and scheduling has shown dramatic throughput improvement over layered designs for wireless networks. In p...
Chih-Chun Wang, Ness B. Shroff
140
Voted
APNOMS
2006
Springer
15 years 7 months ago
An Admission Control and Traffic Engineering Model for Diffserv-MPLS Networks
Abstract. This paper presents a Bandwidth Broker (BB) based admission control and traffic engineering model for Diffserv supported MPLS networks. The proposed model uses a multi-pa...
Haci A. Mantar
121
Voted
RAID
2010
Springer
15 years 2 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
115
Voted
APNOMS
2009
Springer
15 years 10 months ago
Group P2P Network Organization in Mobile Ad-Hoc Network
This paper proposes an effective file searching scheme named Group P2P to reduce the number of message transmission. In the Group P2P, peers distinguish Parent Peer from Child Peer...
Rim Haw, Choong Seon Hong, Dae Sun Kim