Sciweavers

283 search results - page 41 / 57
» OSPF Monitoring: Architecture, Design, and Deployment Experi...
Sort
View
122
Voted
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
15 years 6 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov
LCN
2000
IEEE
15 years 4 months ago
Efficient Congestion Avoidance Mechanism
The nowadays Internet architecture is mainly based on unicast communications and best-effort service. However, the development of the Internet encouraged emerging services that ar...
Anca Dracinschi Sailer, Serge Fdida
KBS
2007
100views more  KBS 2007»
15 years 7 days ago
A retraining methodology for enhancing agent intelligence
Data mining has proven a successful gateway for discovering useful knowledge and for enhancing business intelligence in a range of application fields. Incorporating this knowledg...
Andreas L. Symeonidis, Ioannis N. Athanasiadis, Pe...
IMC
2010
ACM
14 years 10 months ago
The effect of packet loss on redundancy elimination in cellular wireless networks
Network-level redundancy elimination (RE) algorithms reduce traffic volume on bandwidth-constrained network paths by avoiding the transmission of repeated byte sequences. Previous...
Cristian Lumezanu, Katherine Guo, Neil Spring, Bob...
MOBICOM
2004
ACM
15 years 5 months ago
The changing usage of a mature campus-wide wireless network
Wireless Local Area Networks (WLANs) are now commonplace on many academic and corporate campuses. As “Wi-Fi” technology becomes ubiquitous, it is increasingly important to und...
Tristan Henderson, David Kotz, Ilya Abyzov