Sciweavers

1389 search results - page 274 / 278
» Predicting and Evaluating Distributed Communication Performa...
Sort
View
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 3 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
LCN
2006
IEEE
15 years 3 months ago
Considerations of SCTP Retransmission Delays for Thin Streams
The popularity of distributed interactive applications has exploded in the last few years. For example, massive multi-player online games have become a fast growing, multi-million...
Jon Pedersen, Carsten Griwodz, Pål Halvorsen
VTC
2006
IEEE
121views Communications» more  VTC 2006»
15 years 3 months ago
Multiobjective QoS-Oriented Planning for Indoor Wireless LANs
Abstract— This paper describes an automatic wireless LAN access points planning approach based on a multicriteria modelling and solving. A realistic and efficient wLAN planning ...
Katia Jaffrès-Runser, Jean-Marie Gorce, St&...
IMC
2006
ACM
15 years 3 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
SACMAT
2006
ACM
15 years 3 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov