The Least Attained Service (LAS) scheduling policy, when used for scheduling packets over the bottleneck link of an Internet path, can greatly reduce the average flow time for sh...
Idris A. Rai, Guillaume Urvoy-Keller, Mary K. Vern...
IP anycast, with its innate ability to find nearby resources in a robust and efficient fashion, has long been considered an important means of service discovery. The growth of P2...
International standardization in information representation, organization, and dissemination are meant to eliminate the discrepancies in communication among participating organiza...
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
The paper proposes an analytical approach to blocking probability calculation in the UMTS network carrying a mixture of multi-rate traffic, under the assumption that the part of re...
Maciej Stasiak, Piotr Zwierzykowski, Damian Parnie...