Sciweavers

8770 search results - page 1385 / 1754
» Named Service Networking
Sort
View
CNSR
2005
IEEE
15 years 10 months ago
Third-Party Flow Control
Flow control is critical to the efficient operation of Internet Service Providers network equipment. In particular, the ability to effectively shape traffic can reduce cost and ...
Dushyant Bansal, Paul A. S. Ward
HICSS
2005
IEEE
133views Biometrics» more  HICSS 2005»
15 years 10 months ago
Who Joins the Platform? The Case of the RFID Business Ecosystem
Today, many knowledge-based technology applications form a business ecosystem: a set of complex products and services made by multiple firms in which no firm is dominant. For this...
Anne Quaadgras
HOTI
2005
IEEE
15 years 10 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
MM
2005
ACM
121views Multimedia» more  MM 2005»
15 years 10 months ago
Impact of incentive mechanisms on quality of experience
Since entities participating in P2P networks are usually autonomous and therefore free to decide on their level of participation, mechanisms to resolve conflicts between individu...
Andrew Roczniak, Abdulmotaleb El-Saddik
WOSP
2005
ACM
15 years 10 months ago
Applying SPE techniques for modeling a grid-enabled JAVA platform
Advances in Internet and the availability of powerful computers and high-speed networks have propitiated the rise of Grids. The scheduling of applications is complex in Grids due ...
Mariela Curiel, M. Angélica Pérez, R...
« Prev « First page 1385 / 1754 Last » Next »