Sciweavers

7329 search results - page 1205 / 1466
» Network Extractor Protocols
Sort
View
CN
2007
99views more  CN 2007»
15 years 4 months ago
Design and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
IAJIT
2007
150views more  IAJIT 2007»
15 years 4 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
JCM
2007
191views more  JCM 2007»
15 years 4 months ago
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions
— The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the physical layer. This approach addresses a uniq...
Xiaohua Li, Juite Hwu, E. Paul Ratazzi
SIGMETRICS
2010
ACM
180views Hardware» more  SIGMETRICS 2010»
15 years 3 months ago
Route oracle: where have all the packets gone?
Many network-management problems in large backbone networks need the answer to a seemingly simple question: where does a given IP packet, entering the network at a particular plac...
Yaping Zhu, Jennifer Rexford, Subhabrata Sen, Aman...
TMC
2010
89views more  TMC 2010»
15 years 3 months ago
SIP-Based IMS Signaling Analysis for WiMax-3G Interworking Architectures
—The third-generation partnership project (3GPP) and 3GPP2 have standardized the IP multimedia subsystem (IMS) to provide ubiquitous and access network-independent IP-based servi...
Arslan Munir, Ann Gordon-Ross
« Prev « First page 1205 / 1466 Last » Next »