Sciweavers

3625 search results - page 678 / 725
» On choosing
Sort
View
COMCOM
2006
129views more  COMCOM 2006»
14 years 12 months ago
An adaptive mobility anchor point selection scheme in Hierarchical Mobile IPv6 networks
In Hierarchical Mobile IPv6 (HMIPv6) networks, the mobility anchor point (MAP) is introduced to localize binding update messages destined to the home agent. In a large-scale wirel...
Sangheon Pack, Minji Nam, Taekyoung Kwon, Yanghee ...
81
Voted
COMCOM
2006
86views more  COMCOM 2006»
14 years 12 months ago
Study on nominee selection for multicast congestion control
Nominee selection plays a key role in nominee-based congestion control, which is essential for multicast services to ensure fairness and congestion avoidance. Without valid design...
Feng Xie, Gang Feng, Chee Kheong Siew
COMCOM
2006
154views more  COMCOM 2006»
14 years 12 months ago
Minimum-cost network hardening using attack graphs
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemin...
Lingyu Wang, Steven Noel, Sushil Jajodia
COR
2006
129views more  COR 2006»
14 years 12 months ago
Game-theoretic analysis of an ancient Chinese horse race problem
This paper analyzes a legendary Chinese horse race problem involving the King of Qi and General Tianji which took place more than 2000 years ago. In this problem each player owns ...
Mingming Leng, Mahmut Parlar
ENTCS
2006
128views more  ENTCS 2006»
14 years 12 months ago
Web Verification: Perspective and Challenges
The Web poses novel and interesting problems for both programming language design and verification--and their intersection. This paper provides a personal outline of one thread of...
Shriram Krishnamurthi