Sciweavers

4761 search results - page 936 / 953
» Performance of Protocols
Sort
View
CORR
2008
Springer
112views Education» more  CORR 2008»
14 years 9 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
80
Voted
AAMAS
2006
Springer
14 years 9 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
CN
2006
89views more  CN 2006»
14 years 9 months ago
Universal IP multicast delivery
Many applications can benefit from ubiquitous availability of multicast delivery. Unfortunately IP multicast coverage on the Internet is spotty at best, limited to individual camp...
Beichuan Zhang, Wenjie Wang, Sugih Jamin, Daniel M...
72
Voted
CN
2006
85views more  CN 2006»
14 years 9 months ago
A scalable and decentralized fast-rerouting scheme with efficient bandwidth sharing
This paper focuses on the protection of virtual circuits (Label Switched Paths, LSPs) in a (G)MPLS (Generalised Multi-Protocol Label Switching) network. The proposed algorithm is ...
Simon Balon, Laurent Mélon, Guy Leduc
103
Voted
CN
2006
104views more  CN 2006»
14 years 9 months ago
Slot allocation schemes for delay sensitive traffic support in asynchronous wireless mesh networks
Heterogeneous multihop wireless networks such as wireless mesh networks consist of a set of resource-constrained mobile nodes that want to communicate with each other and a set of...
V. Vidhyashankar, B. S. Manoj, C. Siva Ram Murthy