Sciweavers

7329 search results - page 1307 / 1466
» Network Extractor Protocols
Sort
View
ECUMN
2007
Springer
15 years 10 months ago
Scalable Mobile Multimedia Group Conferencing Based on SIP Initiated SSM
Multimedia group communication emerges to focal interest at mobile devices, enriching voice or video conferencing and complex collaborative environments. The Internet uniquely pro...
Thomas C. Schmidt, Matthias Wählisch, Hans L....
ICISS
2007
Springer
15 years 10 months ago
Investigating the Impact of Real-World Factors on Internet Worm Propagation
This paper reports the results of our experimentation with modeling worm behavior on a large scale, fully adaptable network simulator. Our experiments focused on areas of worm scan...
Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, J...
139
Voted
PAM
2007
Springer
15 years 10 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
COMSWARE
2006
IEEE
15 years 10 months ago
Separating control software from routers
Abstract— Control software in routers have gotten increasingly complex today. Further, since the control software runs in every router, managing a large network of routers is com...
Ramachandran Ramjee, Furquan Ansari, Martin Havema...
GLOBECOM
2006
IEEE
15 years 10 months ago
The Head-of-Line Blocking Problem on Exposed Terminals in MANETs
— In Mobile Ad Hoc Networks (MANETs), the hidden and the exposed terminal problems affect the throughput of the Medium Access Control (MAC) protocols. Several MAC schemes have be...
Jing Deng, Yi Qian
« Prev « First page 1307 / 1466 Last » Next »