Sciweavers

5234 search results - page 948 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICUMT
2009
15 years 1 months ago
Application of smoothed estimators in spectrum sensing technique based on model selection
In cognitive radio networks, secondary user (SU) does not have rights to transmit when the primary user (PU) band is occupied, that's why a sensing technique must be done. Rec...
Bassem Zayen, Aawatif Hayar, Hamza Debbabi, Hichem...
ISITA
2010
15 years 16 days ago
Performance analysis and optimal power allocation for hybrid incremental relaying
Relaying technique has been developed considerable attention in response to improve reliability and to extend wireless network coverage. One of conventional relaying technique, inc...
Jaeyoung Lee, Sung-il Kim, Jun Heo

Publication
420views
17 years 1 months ago
Adaptive Multilevel Early Congestion Notification
We propose Adaptive Multi-level ECN, a new TCP congestion scheme as an extension to Multi-level Explicit Congestion Notification (MECN). MECN algo- rithm allows network operators t...
A. Durresi, M. Sridharan, Raj Jain
ICCCN
2008
IEEE
15 years 9 months ago
Improving Load Balancing with Multipath Routing
— Internet service providers have to provision network resources to optimize bandwidth utilization. Dynamic routing protocols take traffic variations into account to control the...
Pascal Mérindol, Jean-Jacques Pansiot, St&e...
LCN
2007
IEEE
15 years 9 months ago
Modeling and Performance Analysis of Telephony Gateway REgistration Protocol
Abstract—Telephony gateways are devices that interface between IP telephony networks and the PSTN. A telephony proxy or location server (LS) that attempts to connect a call for a...
Kushal Kumaran, Anirudha Sahoo