Sciweavers

7329 search results - page 1400 / 1466
» Network Extractor Protocols
Sort
View
IJSNET
2008
94views more  IJSNET 2008»
15 years 3 months ago
Connection data rate optimisation of IEEE 802.15.3 scatternets with multirate carriers
: Designed for high rate Wireless Personal Area Networks (WPANs), the IEEE 802.15.3 Medium Access Control (MAC) protocol supports peer-to-peer communications in a piconet. In this ...
Zhanping Yin, Victor C. M. Leung
CN
2007
121views more  CN 2007»
15 years 3 months ago
Symbiotic rate adaptation for time sensitive elastic traffic with interactive transport
—Interactivity in the transport protocol can greatly benefit transport friendly applications generating streaming traffic. Recently we have developed iTCP, which can provide even...
Javed I. Khan, Raid Zaghal
CN
2007
135views more  CN 2007»
15 years 3 months ago
Handling feature interactions in the language for end system services
Since traditional telecommunication networks assume dumb terminals, there are rarely feature interactions involving end systems. However, in Internet telephony systems, such featur...
Xiaotao Wu, Henning Schulzrinne
COMCOM
2007
111views more  COMCOM 2007»
15 years 3 months ago
Failover, load sharing and server architecture in SIP telephony
We apply some of the existing web server redundancy techniques for high service availability and scalability to the relatively new IP telephony context. The paper compares various...
Kundan Singh, Henning Schulzrinne
JCM
2008
73views more  JCM 2008»
15 years 3 months ago
Secure and Distributed P2P Reputation Management
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way...
Jianli Hu, Quanyuan Wu, Bin Zhou
« Prev « First page 1400 / 1466 Last » Next »