Sciweavers

479 search results - page 48 / 96
» cn 2008
Sort
View
CN
2008
100views more  CN 2008»
14 years 10 months ago
Packet forwarding with source verification
Abstract-- Routers in the Internet do not perform any verification of the source IP address contained in the packets, leading to the possibility of IP spoofing. The lack of such ve...
Craig A. Shue, Minaxi Gupta, Matthew P. Davy
CN
2008
73views more  CN 2008»
14 years 10 months ago
Resilient network admission control
Network admission control (NAC) limits the traffic in a network to avoid overload and to assure thereby the quality of service (QoS) for admitted flows. Overload may occur due to ...
Michael Menth, Stefan Kopf, Joachim Charzinski, Ka...
ACL
2009
14 years 8 months ago
Incremental HMM Alignment for MT System Combination
Inspired by the incremental TER alignment, we re-designed the Indirect HMM (IHMM) alignment, which is one of the best hypothesis alignment methods for conventional MT system combi...
Chi-Ho Li, Xiaodong He, Yupeng Liu, Ning Xi
CN
2006
74views more  CN 2006»
14 years 10 months ago
OMNI: An efficient overlay multicast infrastructure for real-time applications
We consider an overlay architecture (called OMNI) where service providers deploy a set of service nodes (called MSNs) in the network to efficiently implement media-streaming appli...
Suman Banerjee, Christopher Kommareddy, Koushik Ka...
CN
2006
98views more  CN 2006»
14 years 10 months ago
A performance analysis of context transfer protocols for QoS enabled internet services
In nowadays wireless networks, mobile users frequently access Internet services that are often based on information concerning the application context and service status. In prese...
Novella Bartolini, Emiliano Casalicchio