Sciweavers

1080 search results - page 9 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
JCM
2006
126views more  JCM 2006»
14 years 9 months ago
A Multicast Transport Protocol Design Methodology: Analysis, Implementation and Performance Evaluation
In this paper, we propose and analyze a multicast application called SOMA (SynchrOnous Multicast Application) which offers multicast file transfer service in an asymmetric intra-ca...
Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnou...
CN
2006
98views more  CN 2006»
14 years 9 months ago
A performance analysis of context transfer protocols for QoS enabled internet services
In nowadays wireless networks, mobile users frequently access Internet services that are often based on information concerning the application context and service status. In prese...
Novella Bartolini, Emiliano Casalicchio
JSAC
2008
92views more  JSAC 2008»
14 years 9 months ago
Multiuser diversity with capture for wireless networks: protocol and performance analysis
Abstract--In a wireless network, with the aid of rate adaptation, multiuser diversity can be exploited by allowing the mobile user with the best channel to use the channel. However...
Justin Foo, Defeng Huang
LCN
2007
IEEE
15 years 3 months ago
Modeling and Performance Analysis of Telephony Gateway REgistration Protocol
Abstract—Telephony gateways are devices that interface between IP telephony networks and the PSTN. A telephony proxy or location server (LS) that attempts to connect a call for a...
Kushal Kumaran, Anirudha Sahoo
AICCSA
2008
IEEE
283views Hardware» more  AICCSA 2008»
15 years 4 months ago
Performance analysis of identity management in the Session Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) is a standard for managing IP multimedia sessions in the Internet. Identity management in SIP is a crucial security field that deals with id...
Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguy...