Sciweavers

9588 search results - page 1769 / 1918
» Service Value Networks
Sort
View
DATE
2008
IEEE
69views Hardware» more  DATE 2008»
15 years 10 months ago
Time Properties of the BuST Protocol under the NPA Budget Allocation Scheme
Token passing is a channel access technique used in several communication networks. Among them, one of the most effective solution for supporting both real-time traffic (synchron...
Gianluca Franchino, Giorgio C. Buttazzo, Tullio Fa...
GLOBECOM
2008
IEEE
15 years 10 months ago
Queuing Performance of Long-Range Dependent Traffic Regulated by Token-Bucket Policers
 Long-range dependence (LRD) is a widely verified property of Internet traffic, which severely affects network performance yielding longer queuing delays. Token-bucket policers ...
Stefano Bregni, Roberto Cioffi, Paolo Giacomazzi
GLOBECOM
2008
IEEE
15 years 10 months ago
Performance Study of the NSIS QoS-NSLP Protocol
—This paper presents an evaluation of the Quality of Service Signalling Layer Protocol (QoS-NSLP) of the NSIS (Next Steps In Signalling) protocol suite. The QoS-NSLP in combinati...
Mayutan Arumaithurai, Xiaoming Fu, Bernd Schloer, ...
GLOBECOM
2008
IEEE
15 years 10 months ago
TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments
—Communications are increasingly relying on peer– to–peer models of interaction in which all participating entities have the same level of authority. Such models allow develo...
Dimitris Glynos, Patroklos G. Argyroudis, Christos...
ICC
2008
IEEE
102views Communications» more  ICC 2008»
15 years 10 months ago
Reliable Routing for Roadside to Vehicle Communications in Rural Areas
—The demands for vehicular Internet access are proliferating. Access Points (APs) can be deployed along the roadside to provide wireless coverage and network access for mobile ve...
Shen Wan, Jian Tang, Richard S. Wolff
« Prev « First page 1769 / 1918 Last » Next »