Sciweavers

978 search results - page 155 / 196
» WiMAX networks: from access to service platform
Sort
View
CCS
2007
ACM
15 years 3 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
INFOCOM
2008
IEEE
15 years 4 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan
MSWIM
2004
ACM
15 years 3 months ago
An enhanced HCF for IEEE 802.11e wireless networks
In this paper the behavior of the upcoming MAC protocol for wireless LANs IEEE 802.11e is investigated. Based on the results, we propose an enhancement for Hybrid Coordination Fun...
Balasubramanian Appiah Venkatakrishnan, S. Selvake...
MMS
2000
14 years 9 months ago
Video Placement and Configuration of Distributed Video Servers on Cable TV Networks
A large-scale, distributed video-on-demand (VOD) system allows geographically dispersed residential and business users to access video services, such as movies and other multimedia...
Constantinos Vassilakis, Michael Paterakis, Peter ...
WWIC
2009
Springer
157views Communications» more  WWIC 2009»
15 years 4 months ago
An Adaptive Optimized RTO Algorithm for Multi-homed Wireless Environments
As a transport layer protocol SCTP uses end to end metrics, such as Retransmission Time Out (RTO), to manage mobility handover. Our investigation illustrates that Wireless LAN (WLA...
Sheila Fallon, Paul Jacob, Yuansong Qiao, Liam Mur...