Sciweavers

7329 search results - page 1283 / 1466
» Network Extractor Protocols
Sort
View
COMPSEC
2006
90views more  COMPSEC 2006»
15 years 4 months ago
On Incident Handling and Response: A state-of-the-art approach
Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a techn...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
IEICET
2006
109views more  IEICET 2006»
15 years 4 months ago
Capacity of VoIP over HSDPA with Frame Bundling
In this paper, we evaluate the capacity of voice over internet protocol (VoIP) services over high-speed downlink packet access (HSDPA), in which frame-bundling (FB) is incorporated...
Yong-Seok Kim
COMCOM
2007
123views more  COMCOM 2007»
15 years 4 months ago
Seamless transport service selection by deploying a middleware
Despite the many research efforts at the transport layer (SCTP, DCCP, etc.), new innovations in that area hardly ever make it into the TCP/IP stacks of standard end systems. We b...
Sven Hessler, Michael Welzl
JISE
2008
151views more  JISE 2008»
15 years 4 months ago
Design of QoS and Admission Control for VoIP Services Over IEEE 802.11e WLANs
Supporting telephone services using wireless LAN as the access network is an important application nowadays. The SIP and IEEE 802.11e are the two most promising protocols to suppo...
Pei-Yeh Wu, Jen-Jee Chen, Yu-Chee Tseng, Hung-Wei ...
IJCIM
2007
82views more  IJCIM 2007»
15 years 4 months ago
Towards a classification framework for interoperability of enterprise applications
: Software applications interoperability is a challenge for modern enterprises. It needs establishing standards and protocols for data exchange between different enterprise systems...
Hervé Panetto
« Prev « First page 1283 / 1466 Last » Next »