Sciweavers

1477 search results - page 85 / 296
» Token flow control
Sort
View
128
Voted
ESCIENCE
2006
IEEE
15 years 9 months ago
FAME: Adding Multi-Level Authentication to Shibboleth
The paper describes the design of FAME (Flexible Access Middleware Extension) architecture aimed at providing multi-level user authentication service for Shibboleth, which is endo...
Aleksandra Nenadic, Ning Zhang, Jay Chin, Carole A...
112
Voted
CCS
2010
ACM
15 years 3 months ago
CRAFT: a new secure congestion control architecture
Congestion control algorithms seek to optimally utilize network resources by allocating a certain rate for each user. However, malicious clients can disregard the congestion contr...
Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian P...
148
Voted
VIP
2000
15 years 4 months ago
A Simulation Study of Using ER Feedback Control to Transport Compressed Video over ATM Networks
Transporting video over asynchronous transfer mode (ATM) networks has been an active area of research. The Variable Bit rate (VBR) service in ATM networks is primarily designed an...
Xiaomei Yu, Doan B. Hoang, David Dagan Feng
WCE
2007
15 years 4 months ago
A Multi-Agent Approach for Intelligent Traffic-Light Control
—In this paper we propose a multi-agent approach for traffic-light control. According to this approach, our system consists of agents and their world. In this context, the world ...
Visit Hirankitti, Jaturapith Krohkaew, Christopher...
109
Voted
IC
2004
15 years 4 months ago
Controlling Inbound Traffic
This work considers the problem of prioritizing the inbound TCP traffic of an organization network. The objective is to allocate dynamically a specific share of the incoming link ...
Saad Biaz