Sciweavers

359 search results - page 65 / 72
» comcom 2008
Sort
View
COMCOM
2006
154views more  COMCOM 2006»
14 years 9 months ago
Minimum-cost network hardening using attack graphs
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemin...
Lingyu Wang, Steven Noel, Sushil Jajodia
COMCOM
2006
67views more  COMCOM 2006»
14 years 9 months ago
Performance analyses of three geography-based location strategies for PCS networks
Although many location schemes have been proposed and analyzed, the tradeoff among the location registration and the call delivery of different schemes and the relative performanc...
Wei Kuang Lai, Nian-Chin Wu
COMCOM
2004
138views more  COMCOM 2004»
14 years 9 months ago
Issues with inferring Internet topological attributes
A number of recent studies of Internet network structure are based on data collected from inter-domain BGP routing tables and tools, such as traceroute, to probe end-to-end paths....
Lisa Amini, Anees Shaikh, Henning Schulzrinne
COMCOM
2004
118views more  COMCOM 2004»
14 years 9 months ago
SLA-based QoS pricing in DiffServ networks
The availability of high-speed transmission media and networking equipment in contemporary networks, as well as the evolution of quality-demanding applications has focused researc...
Christos Bouras, Afrodite Sevasti
COMCOM
2004
112views more  COMCOM 2004»
14 years 9 months ago
Design and analysis of optimal adaptive de-jitter buffers
In order to transfer voice or some other application requiring real-time delivery over a packet network, we need a de-jitter buffer to eliminate delay jitters. An important design...
Gagan L. Choudhury, Robert G. Cole