Sciweavers

8770 search results - page 1550 / 1754
» Named Service Networking
Sort
View
CCR
2006
98views more  CCR 2006»
14 years 11 months ago
Update on buffer sizing in internet routers
In the past two years, several papers have proposed rules that suggest two to five orders of magnitude reduction in Internet core router buffers. Others present scenarios where bu...
Yashar Ganjali, Nick McKeown
FGCS
2006
56views more  FGCS 2006»
14 years 11 months ago
Interactive 3D HD video transport for e-science collaboration over UCLP-enabled GLORIAD lightpath
Emerging large-scale applications for e-science and Grid require end-to-end lightpaths that need to be dynamically provisioned with QoS (quality of service) guarantees. In this pa...
Jinyong Jo, Wontaek Hong, Seungjoo Lee, Dongkyun K...
ISM
2006
IEEE
132views Multimedia» more  ISM 2006»
14 years 11 months ago
BM-ALM: An Application Layer Multicasting with Behavior Monitoring Approach
IP multicasting is the most efficient way to perform group data distribution, as it eliminates traffic redundancy and improves bandwidth utilization. Application Layer Multicast (...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
JSAC
2008
123views more  JSAC 2008»
14 years 11 months ago
A Game Theoretical Framework for Dynamic Pricing-Based Routing in Self-Organized MANETs
In self-organized mobile ad hoc networks (MANETs) where each user is its own authority, fully cooperative behaviors, such as unconditionally forwarding packets for each other or ho...
Zhu Ji, Wei Yu, K. J. Ray Liu
JCO
2006
67views more  JCO 2006»
14 years 11 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
« Prev « First page 1550 / 1754 Last » Next »