Sciweavers

13966 search results - page 2747 / 2794
» The Internet a
Sort
View
IJSN
2007
129views more  IJSN 2007»
14 years 11 months ago
Single packet IP traceback in AS-level partial deployment scenario
Tracing IP packets to their sources, known as IP traceback, is an important task in defending against IP spoofing and DoS attacks. Log-based IP traceback technique is to log pack...
Turgay Korkmaz, Chao Gong, Kamil Saraç, San...
IJWMC
2007
111views more  IJWMC 2007»
14 years 11 months ago
Adaptive semi-soft handoff for Cellular IP networks
—Rapid advances in wireless networking have led to more mobile phones, PDAs, and other digital mobile devices becoming ubiquitously connected to the Internet. As the demand of de...
Eriko Nurvitadhi, Ben Lee, Chansu Yu, Myungchul Ki...
IJWMC
2007
84views more  IJWMC 2007»
14 years 11 months ago
Towards all-IP wireless networks: architectures and resource management mechanism
Future wireless Internet will consist of different wireless technologies that should operate together in an efficient way to provide seamless connectivity to mobile users. The in...
Majid Ghaderi, Raouf Boutaba
TC
2008
14 years 11 months ago
The Convergence-Guaranteed Random Walk and Its Applications in Peer-to-Peer Networks
Network structure construction and global state maintenance are expensive in large-scale, dynamic peer-to-peer (p2p) networks. With inherent topology independence and low state mai...
Ming Zhong, Kai Shen, Joel I. Seiferas
INFORMATICASI
2007
110views more  INFORMATICASI 2007»
14 years 11 months ago
Modeling e-Government processes with UMM
The United Nation’s Center for Trade Facilitation and Electronic Business (UN/CEFACT)) is a standardization body known for its work on UN/EDIFACT and ebXML. One of its most rece...
Philipp Liegl, Rainer Schuster, Marco Zapletal, Ch...
« Prev « First page 2747 / 2794 Last » Next »