Sciweavers

2672 search results - page 255 / 535
» Testing Self-Similar Networks
Sort
View
CORR
2010
Springer
152views Education» more  CORR 2010»
15 years 5 months ago
Automatic analysis of distance bounding protocols
Distance bounding protocols are used by nodes in wireless networks for the crucial purpose of estimating their distances to other nodes. Past efforts to analyze these protocols hav...
Sreekanth Malladi, Bezawada Bruhadeshwar, Kishore ...
JCIT
2008
245views more  JCIT 2008»
15 years 5 months ago
Quality of Service (QoS) of Voice over MAC Protocol 802.11 using NS-2
Transmitting voice through IP data network can provide significant cost savings. However if not managed properly, voice quality can degrade due to data network congestion. Voice o...
Dileep Kumar, Saleem Ahmed, Yeonseung Ryu
JSAC
2006
165views more  JSAC 2006»
15 years 4 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
JSAC
2006
120views more  JSAC 2006»
15 years 4 months ago
Multiple-Source Internet Tomography
Abstract-- Information about the topology and link-level characteristics of a network is critical for many applications including network diagnostics and management. However, this ...
Michael Rabbat, Mark Coates, Robert D. Nowak
154
Voted
MTA
2008
96views more  MTA 2008»
15 years 4 months ago
Proxy-assisted periodic broadcast for video streaming with multiple servers
Large scale video streaming over Internet requires a large amount of resources such as server I/O bandwidth, network bandwidth. A number of video delivery techniques can be used to...
Ewa Kusmierek, David Hung-Chang Du