Sciweavers

286 search results - page 51 / 58
» Transport and Application Protocol Scrubbing
Sort
View
IEEEARES
2008
IEEE
15 years 4 months ago
Rapid Detection of Constant-Packet-Rate Flows
—The demand for effective VoIP and online gaming traffic management methods continues to increase for purposes such as QoS provisioning, usage accounting, and blocking VoIP call...
Kuan-Ta Chen, Jing-Kai Lou
WCNC
2008
IEEE
15 years 4 months ago
ECHO: A Quality of Service Based Endpoint Centric Handover Scheme for VoIP
– Existing terminal oriented handover mechanisms capable of meeting the strict delay bounds of real time applications such as VoIP do not consider the QoS of candidate handover n...
John Fitzpatrick, Seán Murphy, Mohammed Ati...
AICT
2007
IEEE
180views Communications» more  AICT 2007»
15 years 4 months ago
BPTraSha: A Novel Algorithm for Shaping Bursty Nature of Internet Traffic
Various researchers have reported that traffic measurements demonstrate considerable burstiness on several time scales, with properties of self-similarity. Also, the rapid developm...
Karim Mohammed Rezaul, Vic Grout
84
Voted
ICC
2007
IEEE
128views Communications» more  ICC 2007»
15 years 4 months ago
Supporting the Sink Mobility: a Case Study for Wireless Sensor Networks
— This paper deals with a system level design solution to support information gathering in the presence of a mobile querying node that experiences frequent disconnections from a ...
David Tacconi, Iacopo Carreras, Daniele Miorandi, ...
76
Voted
ICN
2005
Springer
15 years 3 months ago
Securing Layer 2 in Local Area Networks
Abstract. Network security problems have been well known and addressed in the application, transport, or network layers. However, the Data Link Layer (Layer 2) security has not bee...
Hayriye Altunbasak, Sven Krasser, Henry L. Owen, J...