Sciweavers

2904 search results - page 377 / 581
» Internet Infrastructure Security
Sort
View
TNC
2004
103views Education» more  TNC 2004»
15 years 5 months ago
Roaming Network Access Using Shibboleth
There are activities aiming at abling users to dock to a wireless or wired network while visiting organisations outside the premises of their usual connection to the network. Thes...
Mikael Linden, Viljo Viitanen
MASCOTS
2003
15 years 5 months ago
Creating Realistic BGP Models
Modeling the Internet infrastructure is a challenging endeavor. Complex interactions between protocols, increasing traffic volumes and the irregular structure of the Internet lea...
Xenofontas A. Dimitropoulos, George F. Riley
AAAI
2000
15 years 5 months ago
Robust Combinatorial Auction Protocol against False-Name Bids
This paper presents a new combinatorial auction protocol (LDS protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commer...
Makoto Yokoo, Yuko Sakurai, Shigeo Matsubara
USITS
2003
15 years 5 months ago
Using Fault Injection and Modeling to Evaluate the Performability of Cluster-Based Services
We propose a two-phase methodology for quantifying the performability (performance and availability) of cluster-based Internet services. In the first phase, evaluators use a fault...
Kiran Nagaraja, Xiaoyan Li, Ricardo Bianchini, Ric...
COMCOM
2008
138views more  COMCOM 2008»
15 years 4 months ago
MRP: Wireless mesh networks routing protocol
Wireless Mesh Networks (WMNs) are one of the few commonly implemented types of mobile ad-hoc networks (MANETs); several companies offer WMNs for broadband Internet access and for ...
Jangeun Jun, Mihail L. Sichitiu