Sciweavers

2014 search results - page 116 / 403
» Network Management Challenges for Next Generation Networks
Sort
View
105
Voted
CCS
2007
ACM
15 years 9 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
135
Voted
COMCOM
2008
154views more  COMCOM 2008»
15 years 3 months ago
Analysis of hybrid P2P overlay network topology
Modeling peer-to-peer (P2P) networks is a challenge for P2P researchers. In this paper, we provide a detailed analysis of large-scale hybrid P2P overlay network topology, using Gn...
Chao Xie, Guihai Chen, Art Vandenberg, Yi Pan
145
Voted
BTW
2007
Springer
185views Database» more  BTW 2007»
15 years 9 months ago
Data Staging for OLAP- and OLTP-Applications on RFID Data
: The emerging trend towards seamless monitoring of all business processes via comprehensive sensor networks – in particular RFID readers – creates new data management challeng...
Stefan Krompass, Stefan Aulbach, Alfons Kemper
122
Voted
BROADNETS
2007
IEEE
15 years 10 months ago
Route diversity: A future for transmission protocols?
—This contribution is attempting to show how a route diversity can improve the traffic behavior of a connection between two network entities. The most used transmission protocol...
Foued Melakessou, Ulrich Sorger, Zdzislaw Suchanec...
132
Voted
ICSNC
2007
IEEE
15 years 10 months ago
Automated QoS policy adaptation for heterogeneous access network environments
To support QoS guarantee and resource usage in heterogeneous access network environments more efficiently (UMTS, WIMAX, WLAN DVB-T, DVB-H), there is the challenge of automated con...
Pedro A. Aranda-Gutiérrez, Ilka Miloucheva