Sciweavers

584 search results - page 79 / 117
» Fundamental limitations in control over a communication chan...
Sort
View
98
Voted
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
14 years 9 months ago
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password
This paper presents an entire chaos-based biometric remote user authentication scheme on tokens without using passwords. The proposed scheme is based on the chaotic hash function a...
Eun-Jun Yoon, Kee-Young Yoo
89
Voted
SIGCOMM
2000
ACM
15 years 4 months ago
A stochastic model of TCP/IP with stationary random
In this paper, we present a model for TCP/IP ow control mechanism. The rate at which data is transmitted increases linearly in time until a packet loss is detected. At that point,...
Eitan Altman, Konstantin Avrachenkov, Chadi Baraka...
WMI
2001
112views more  WMI 2001»
15 years 1 months ago
Quality of service and mobility for the wireless internet
Our paper explores the issue of how to provide appropriate quality of service mechanisms closely integrated with flexible mobility management in wireless local area networks. We co...
J. Antonio García-Macías, Franck Rou...
144
Voted
MSS
2005
IEEE
182views Hardware» more  MSS 2005»
15 years 6 months ago
Evaluation of Advanced TCP Stacks in the iSCSI Environment using Simulation Model
Enterprise storage demands have overwhelmed traditional storage mechanisms and have led to the development of Storage Area Networks (SANs). This has resulted in the design of SCSI...
Girish Motwani, K. Gopinath
105
Voted
ATAL
2007
Springer
15 years 4 months ago
Distributed agent-based air traffic flow management
Air traffic flow management is one of the fundamental challenges facing the Federal Aviation Administration (FAA) today. The FAA estimates that in 2005 alone, there were over 322,...
Kagan Tumer, Adrian K. Agogino