Sciweavers

92
Voted
CN
1999
92views more  CN 1999»
15 years 3 days ago
Managing TCP Connections Under Persistent HTTP
Hyper Text Transfer Protocol (HTTP) traffic dominates Internet traffic. The exchange of HTTP messages is implemented
Edith Cohen, Haim Kaplan, Jeffrey D. Oldham
CN
1999
126views more  CN 1999»
15 years 3 days ago
Towards a Better Understanding of Web Resources and Server Responses for Improved Caching
This work focuses on characterizing information about Web resources and server responses that is relevant to Web caching. The approach is to study a set of URLs at a variety of si...
Craig E. Wills, Mikhail Mikhailov
106
Voted
CN
1999
100views more  CN 1999»
15 years 3 days ago
Testing protocols modeled as FSMs with timing parameters
An optimization method is introduced for generating minimum-length test sequences taking into account timing constraints for FSM models of communication protocols. Due to active t...
M. Ümit Uyar, Mariusz A. Fecko, Adarshpal S. ...
CN
1999
128views more  CN 1999»
15 years 3 days ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
87
Voted
CN
1999
88views more  CN 1999»
15 years 3 days ago
Building a high-performance, programmable secure coprocessor
Secure coprocessors enable secure distributed applications by providing safe havens where an application program can Z .execute and accumulate state , free of observation and inte...
Sean W. Smith, Steve Weingart
104
Voted
CN
1999
98views more  CN 1999»
15 years 3 days ago
Managing application level quality of service through TOMTEN
With the growth of mobile computing, users will have simultaneous access to multiple overlaid networks, each with Zdifferent characteristics, services and costs. This paper introd...
R. De Silva, Björn Landfeldt, Sebastien Ardon...
112
Voted
CN
1999
106views more  CN 1999»
15 years 3 days ago
Impact of wireless access on traffic management in ATM networks
Traffic management plays an important role in providing differentiated quality of service to the users and to support the integration of a variety of broadband services within a c...
Rolf Sigle, Thomas Renger
119
Voted
CN
1999
98views more  CN 1999»
15 years 3 days ago
Mobility information for resource management in wireless ATM networks
ZUser mobility poses a significant technical challenge to network resource management in wireless ATM Asynchronous . Z .Transfer Mode networks. In order to guarantee quality of se...
Xuemin Shen, Jon W. Mark
88
Voted
CN
1999
119views more  CN 1999»
15 years 3 days ago
Internet Telephony: Architecture and Protocols - an IETF Perspective
Internet telephony offers the opportunity to design a global multimedia communications system that may eventually replace the existing telephony infrastructure. We describe the up...
Henning Schulzrinne, Jonathan Rosenberg
102
Voted
CN
1999
84views more  CN 1999»
15 years 3 days ago
Implementation of the pan-European academic research network: TEN-155
This paper addresses the implementation of a pan-European network to support co-operative research amongst European researchers: TEN-155. Predecessors to TEN-155 were TEN-34 and E...
Roberto Sabatino, Jose Manuel de Arce