Sciweavers

8770 search results - page 140 / 1754
» Named Service Networking
Sort
View
111
Voted
WSS
2001
110views Control Systems» more  WSS 2001»
15 years 4 months ago
On the Security and Vulnerability of PING
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is se...
Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
249
Voted
AAAIDEA
2005
IEEE
15 years 9 months ago
A Peer-to-Peer Infrastructure for Resilient Web Services
This paper describes an infrastructure for the deployment and use of Web Services that are resilient to the failure of the nodes that host those services. The infrastructure prese...
Stuart J. Norcross, Alan Dearle, Graham N. C. Kirb...
155
Voted
AAIM
2007
Springer
126views Algorithms» more  AAIM 2007»
15 years 9 months ago
Mixed Criteria Packet Scheduling
Packet scheduling in networks with quality of service constraints has been extensively studied as a single criterion scheduling problem. The assumption underlying single criterion ...
Chad R. Meiners, Eric Torng
126
Voted
CCR
2002
62views more  CCR 2002»
15 years 3 months ago
An enforced inter-admission delay performance-driven connection admission control algorithm
Connection Admission Control (CAC) is an important function in a computer network that supports Quality of Service (QoS). The function of CAC is to decide whether a new connection...
Stanislav Belenki
APNOMS
2007
Springer
15 years 9 months ago
Providing Consistent Service Levels in IP Networks
Abstract. The use of Internet as an ubiquitous communication platform puts a strong demand on service providers regarding the assurance of multiple service levels consistently. Des...
Solange Rito Lima, Pedro Sousa, Paulo Carvalho