This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
— In this paper we present new queue length based Internet congestion control protocol which is shown through simulations to work effectively. The control objective is to regulat...
Marios Lestas, Andreas Pitsillides, Petros A. Ioan...
Efficient service discovery in dynamic, crossorganizational VO is one of the challenge aspects in ChinaGrid. Network overlay and search algorithms are two important considerations...
Jing Tie, Hai Jin, Shengli Li, Xuanhua Shi, Hanhua...
We describe a system for achieving PNNI (Private Network-Network Interface) Global Routing Infrastructure Protection (PGRIP). We give details of PGRIP's system-level design a...
Sabrina De Capitani di Vimercati, Patrick Lincoln,...
VRML (the Virtual Reality Modeling Language) has brought 3D objects and virtual worlds to a large number of Internet users. While it provides a suitable basis for the platform ind...