Sciweavers

5324 search results - page 794 / 1065
» Internet Security Protocols
Sort
View
111
Voted
WCE
2007
15 years 1 months ago
A Performance Based Evaluation of SIP Signalling across Converged Networks
—As wireless networks evolves towards the 3G and 4G architectures the mobile core networks provides a platform for all-IP convergence of mobile and fixed networks allowing for be...
Adetola Oredope, Antonio Liotta
98
Voted
COMAD
2009
15 years 1 months ago
Consistency of Databases on Commodity Disk Drives
Most database systems use ARIES-like logging and recovery scheme to recover from failures and guarantee transactional consistency. ARIES relies on the Write-Ahead Logging (WAL) pr...
Robin Dhamankar, Hanuma Kodavalla, Vishal Kathuria
CCR
2008
91views more  CCR 2008»
15 years 23 days ago
UFO: a resilient layered routing architecture
Conventional wisdom has held that routing protocols cannot achieve both scalability and high availability. Despite scaling relatively well, today's Internet routing system do...
Yaping Zhu, Andy C. Bavier, Nick Feamster, Sampath...
92
Voted
CORR
2008
Springer
127views Education» more  CORR 2008»
15 years 23 days ago
On the long time behavior of the TCP window size process
The TCP window size process appears in the modeling of the famous Transmission Control Protocol used for data transmission over the Internet. This continuous time Markov process t...
Djalil Chafaï, Florent Malrieu, Katy Paroux
99
Voted
COMCOM
2006
115views more  COMCOM 2006»
15 years 21 days ago
IPv6 deployment: Real time applications and QoS aspects
This paper gives an overview of the issues related to the QoS mechanisms under IPv6 and the transition of applications to the new Internet protocol. We describe the implementation...
Christos Bouras, Apostolos Gkamas, Dimitris Primpa...