This paper proposes a mechanism for equation-based congestion control for unicast traffic. Most best-effort traffic in the current Internet is well-served by the dominant transp...
Sally Floyd, Mark Handley, Jitendra Padhye, Jö...
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
This paper presents a new combinatorial auction protocol (LDS protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commer...
Many of the current crises in contemporary healthcare management centre on issues concerning information management and costs. Electronic commerce (or e-commerce) activity, grounde...
Receiver-driven Layered Multicast (RLM) has previously been proposed to distribute video over the best-effort heterogeneous IP networks. Although RLM can avoid network overloading ...