Sciweavers

7329 search results - page 1321 / 1466
» Network Extractor Protocols
Sort
View
COMPSAC
2008
IEEE
15 years 5 months ago
Fabrication of Ontology for Security in Health Care Systems
Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....
J. Indumathi, G. V. Uma
CONEXT
2008
ACM
15 years 5 months ago
Advantages of a PCE-based control plane for LISP
The Locator/Identifier Separation Protocol (LISP) is one of the candidate solutions to address the scalability issues in inter-domain routing. The current proposals for its contro...
Alberto Castro, Martín Germán, Xavie...
LREC
2010
135views Education» more  LREC 2010»
15 years 5 months ago
Language Resource Management System for Asian WordNet Collaboration and Its Web Service Application
This paper presents the language resource management system for the development and dissemination of Asian WordNet (AWN) and its web service application. We develop the platform t...
Virach Sornlertlamvanich, Thatsanee Charoenporn, H...
CCN
2006
137views Communications» more  CCN 2006»
15 years 5 months ago
Impact of sack delay and link delay on failover performance in SCTP
The Stream Control Transmission Protocol (SCTP) was developed to support the transfer of telephony signaling over IP networks. One of the ambitions when designing SCTP was to offe...
Johan Eklund, Anna Brunstrom
CNIS
2006
15 years 5 months ago
Towards effective packet classification
A variety of network security services, such as access control in firewalls and protocol analysis in intrusion detection systems, require the discrimination of packets based on th...
Yaxuan Qi, Jun Li
« Prev « First page 1321 / 1466 Last » Next »