Sciweavers

1477 search results - page 98 / 296
» Token flow control
Sort
View
267
Voted

Lecture Notes
401views
17 years 1 months ago
Introduction to Computer Networking
The lecture notes cover the following topics, Course Overview , Data Communications and Networking Overview , Data Transmission , Transmission Media , Signal Encoding Techniques ...
Raj Jain
128
Voted
ICNS
2007
IEEE
15 years 10 months ago
Performance Evaluation of Real-Time Message Delivery in RDM Algorithm
Complexity of distributed real-time applications such as automotive electronics has increased dramatically over the last couple of years. As a result, developing communication pro...
Shabnam Mirshokraie, Mojtaba Sabeghi, Mahmoud Nagh...
104
Voted
ESCIENCE
2006
IEEE
15 years 9 months ago
User Programmable Virtualized Networks
This paper introduces the concept of a User Programmable Virtualized Network, which allows networks to deliver application specific services using network element components that ...
Robert J. Meijer, Rudolf J. Strijkers, Leon Gomman...
125
Voted
IMECS
2007
15 years 5 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
CORR
2008
Springer
143views Education» more  CORR 2008»
15 years 3 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani