Sciweavers

83 search results - page 9 / 17
» Programmable accounting management for virtual private netwo...
Sort
View

Publication
1298views
16 years 8 months ago
Quality of Service for Internet Traffic over ATM Service Categories
Connecting enterprise sites requires innovative architectures. Virtual private networks (VPNs) linking different organizational sites over the Internet are a popular solution. Inte...
Sonia Fahmy, Raj Jain, Sameh Rabie, Rohit Goyal, B...
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
15 years 10 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
WCNC
2008
IEEE
15 years 4 months ago
Anonymous ID-Based Group Key Agreement for Wireless Networks
—Popularity of group-oriented applications motivates research on security and privacy protection for group communications. A number of group key agreement protocols exploiting ID...
Zhiguo Wan, Kui Ren, Wenjing Lou, Bart Preneel
TON
2008
160views more  TON 2008»
14 years 10 months ago
Label space reduction in MPLS networks: how much can a single stacked label do?
Most network operators have considered reducing LSR label spaces (number of labels used) as a way of simplifying management of underlaying Virtual Private Networks (VPNs) and there...
Fernando Solano, Thomas Stidsen, Ramón Fabr...
VRST
1999
ACM
15 years 2 months ago
Patterns of network and user activity in an inhabited television event
Inhabited Television takes traditional broadcast television and combines it with multiuser virtual reality, to give new possibilities for interaction and participation in and arou...
Chris Greenhalgh, Steve Benford, Michael P. Craven