Sciweavers

1144 search results - page 167 / 229
» Implementation of end-to-end abstractions in a network servi...
Sort
View
ICC
2007
IEEE
15 years 5 months ago
A Mobility Scheme for Personal and Terminal Mobility
Abstract— An IP mobility support protocol that enables personal and terminal mobility for IP-based applications is put forward. This protocol does not require new network entitie...
Bu-Sung Lee, Teck Meng Lim, Chai Kiat Yeo, Quang V...
74
Voted
AOIS
2004
15 years 17 days ago
Mobeet: A Multi-agent Framework for Ubiquitous Information Systems
Abstract. In recent years, the rapid development of network infrastructure and the spread of terminals capable of network access have made it possible to access networks at any pla...
Nobukazu Yoshioka, Akihiko Ohsuga, Shinichi Honide...
ARC
2006
Springer
122views Hardware» more  ARC 2006»
15 years 2 months ago
UNITE: Uniform Hardware-Based Network Intrusion deTection Engine
Abstract. Current software implementations of network intrusion detection reach a maximum network connection speed of about 1Gbps (Gigabits per second). This paper analyses the Sno...
Sherif Yusuf, Wayne Luk, M. K. N. Szeto, William G...
JUCS
2002
116views more  JUCS 2002»
14 years 10 months ago
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
: ATM virtual path (VP) contains bundles of virtual channels (VCs). A VP layer network can be used as a server layer network of VC layer networks and each VC layer network can be a...
Daniel Won-Kyu Hong, Choong Seon Hong, Dong-Sik Yu...
INFOCOM
2009
IEEE
15 years 5 months ago
Network Bandwidth Allocation via Distributed Auctions with Time Reservations
—This paper studies the problem of allocating network capacity through periodic auctions. Motivated primarily by a service overlay architecture, we impose the following condition...
Pablo Belzarena, Andrés Ferragut, Fernando ...