Sciweavers

2947 search results - page 530 / 590
» The timely token protocol
Sort
View
ICMCS
2009
IEEE
98views Multimedia» more  ICMCS 2009»
14 years 9 months ago
Scalability of HTTP pacing with intelligent bursting
While streaming protocols like RTSP/RTP have continued to evolved, HTTP has remained a primary method for Web-based video retrieval. The ubiquity and simplicity of HTTP makes it a...
Kevin J. Ma, Radim Bartos, Swapnil Bhatia
ISF
2010
164views more  ISF 2010»
14 years 9 months ago
An SVM-based machine learning method for accurate internet traffic classification
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven t...
Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu
CAI
2011
Springer
14 years 7 months ago
Email Analysis and Information Extraction for Enterprise Benefit
In spite of rapid advances in multimedia and interactive technologies, enterprise users prefer to battle with email spam and overload rather than lose the benefits of communicatin...
Michal Laclavik, Stefan Dlugolinsky, Martin Seleng...
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 6 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
JSAC
2011
115views more  JSAC 2011»
14 years 6 months ago
Scalable Cross-Layer Wireless Access Control Using Multi-Carrier Burst Contention
Abstract—The increasing demand for wireless access in vehicular environments (WAVE) supporting a wide range of applications such as traffic safety, surveying, infotainment etc.,...
Bogdan Roman, Ian J. Wassell, Ioannis Chatzigeorgi...