Sciweavers

8770 search results - page 1359 / 1754
» Named Service Networking
Sort
View
ICNP
1997
IEEE
15 years 8 months ago
On path selection for traffic with bandwidth guarantees
Transmission ofmultimedia streams imposesa minimum-bandwidth requirementon the path being usedto ensureend-to-endQuality-ofService (QoS) guarantees. While any shortest-path algori...
Qingming Ma, Peter Steenkiste
ANCS
2008
ACM
15 years 6 months ago
Packet prediction for speculative cut-through switching
The amount of intelligent packet processing in an Ethernet switch continues to grow, in order to support of embedded applications such as network security, load balancing and qual...
Paul Congdon, Matthew Farrens, Prasant Mohapatra
129
Voted
IJNM
2006
175views more  IJNM 2006»
15 years 4 months ago
An OPNET-based simulation approach for deploying VoIP
These days a massive deployment of VoIP is taking place over IP networks. VoIP deployment is a challenging task for network researchers and engineers. This paper presents a detaile...
Khaled Salah, A. Alkhoraidly
IMC
2010
ACM
15 years 2 months ago
Speed testing without speed tests: estimating achievable download speed from passive measurements
How fast is the network? The speed at which real users can download content at different locations and at different times is an important metric for service providers. Knowledge o...
Alexandre Gerber, Jeffrey Pang, Oliver Spatscheck,...
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 11 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
« Prev « First page 1359 / 1754 Last » Next »