Sciweavers

908 search results - page 148 / 182
» From communication networks to fuzzy sets
Sort
View
ISCC
2008
IEEE
15 years 6 months ago
A vendor-independent resource control framework for WiMAX
In this paper, a novel solution to dynamically control the resources of a WiMAX system is proposed. The presented solution is aligned with the NGN trends, as well as with the WiMA...
Pedro Neves, Tuomas Nissilä, Telmo Pereira, I...
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
15 years 6 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
ICC
2007
IEEE
203views Communications» more  ICC 2007»
15 years 6 months ago
A Multi-Scale Tomographic Algorithm for Detecting and Classifying Traffic Anomalies
—The occurrence of a traffic anomaly is always responsible for a degradation of performance. The anomaly can be observable, at some scale, in different ways: an increase in the n...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
ICOIN
2001
Springer
15 years 4 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
INFOCOM
2000
IEEE
15 years 4 months ago
A Measurement-Based Admission-Controlled Web Server
Current HTTP servers process requests using a first come first serve queuing policy. What this implies is that the web server must process each request as it arrives. The result is...
Kelvin Li, Sugih Jamin