Sciweavers

156 search results - page 12 / 32
» Internet Protocol Version 6
Sort
View
SIGCOMM
2010
ACM
14 years 12 months ago
Encrypting the internet
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...
81
Voted
TON
1998
87views more  TON 1998»
14 years 11 months ago
Adaptive hybrid clock discipline algorithm for the network time protocol
This paper describes the analysis, implementation and performance of a new algorithm engineered to discipline a computer clock to a source of standard time, such as a GPS receiver...
David L. Mills
CN
2004
148views more  CN 2004»
14 years 11 months ago
Multiway range trees: scalable IP lookup with fast updates
In this paper, we introduce a new IP lookup scheme with worst-case search and update time of O(log n), where n is the number of prefixes in the forwarding table. Our scheme is base...
Priyank Ramesh Warkhede, Subhash Suri, George Varg...
99
Voted
DSS
2000
94views more  DSS 2000»
14 years 11 months ago
Intelligent internet searching agent based on hybrid simulated annealing
Z .The World-Wide Web WWW based Internet services have become a major channel for information delivery. For the same reason, information overload also has become a serious problem...
Christopher C. Yang, Jerome Yen, Hsinchun Chen
JNW
2008
177views more  JNW 2008»
14 years 11 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...