Sciweavers

455 search results - page 46 / 91
» Peer-to-Peer Traffic in Operator Networks
Sort
View

Publication
194views
16 years 8 months ago
A Survey of Application Layer Techniques for Adaptive Streaming of Multimedia
The current Internet only supports best-effort traffic. New high-speed technologies such as ATM (asynchronous transfer mode), gigabit Ethernet, fast Ethernet, and frame relay, have...
Bobby Vandalore, Wu-chi Feng, Raj Jain, Sonia Fahm...
MASCOTS
2004
14 years 11 months ago
Is TCP Packet Reordering Always Harmful?
IP networks do not provide any guarantee that packets belonging to the same flow are delivered in the correct order. It can be argued that out-of-order reception of packets is lim...
Giovanni Neglia, Vincenzo Falletta, Giuseppe Bianc...
TON
2010
204views more  TON 2010»
14 years 4 months ago
Passive Diagnosis for Wireless Sensor Networks
Network diagnosis, an essential research topic for traditional networking systems, has not received much attention for wireless sensor networks. Existing sensor debugging tools li...
Yunhao Liu, Kebin Liu, Mo Li
COMCOM
2006
93views more  COMCOM 2006»
14 years 9 months ago
A novel method for QoS provisioning with protection in GMPLS networks
In this paper, a new optimal policy is introduced to determine, adapt, and protect the Generalized MultiProtocol Label Switching (GMPLS) network topology based on the current traf...
Tricha Anjali, Caterina M. Scoglio
IJSN
2008
80views more  IJSN 2008»
14 years 9 months ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah