Distributed Route Selection for Establishing Real-Time Channels
IEEE Transactions on Parallel and Distributed Systems
IEEE Transactions on Computers
Window flow control in FIFO networks with cross traffic
Queueing Systems: Theory and Applications
Electronic Commerce Research
Robust transmission of 3D geometry over lossy networks
Web3D '03 Proceedings of the eighth international conference on 3D Web technology
Bridging the Information Gap in Storage Protocol Stacks
ATEC '02 Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference
Verification of a Revised WAP Wireless Transaction Protocol
ICATPN '02 Proceedings of the 23rd International Conference on Applications and Theory of Petri Nets
Packet Analysis in Congested Networks
Progress in Discovery Science, Final Report of the Japanese Discovery Science Project
An Active Programmable Harness for Measurement of Composite Network States
ICN '01 Proceedings of the First International Conference on Networking-Part 2
An optimization model for telecommunication systems
Creating business value with information technology
A telecommunications model for managing complexity of voice and data networks and services
Managing data mining technologies in organizations
Model composition in a distributed environment
Decision Support Systems
Asymmetric splice: optimizing TCP forwarder performance for the HTTP/1.1 protocol
ICCC '02 Proceedings of the 15th international conference on Computer communication
TCP Boston: A Fragmentation-Tolerant TCP Protocol for ATM Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Validating TCP connection management
CRPIT '02 Proceedings of the conference on Application and theory of petri nets: formal methods in software engineering and defence systems - Volume 12
A hybrid architecture for cost-effective on-demand media streaming
Computer Networks: The International Journal of Computer and Telecommunications Networking
Abstract Communication Model for Distributed Systems
IEEE Transactions on Software Engineering
A Markov model of TCP throughput, goodput and slow start
Performance Evaluation - Special issue: Distributed systems performance
Hierarchical task topology for retrieving information from within a simulated information ecosystem
Journal of Network and Computer Applications - Special issue on computational intelligence on the internet
Fair distributed congestion control in multirate multicast networks
IEEE/ACM Transactions on Networking (TON)
Formal description and analysis of a distributed location service for mobile ad hoc networks
Theoretical Computer Science - Abstract state machines and high-level system design and analysis
Estimating flow distributions from sampled flow statistics
IEEE/ACM Transactions on Networking (TON)
Using Dominators to Extract Observable Protocol Contexts
SEFM '05 Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods
MMR: A MultiMedia Router architecture to support hybrid workloads
Journal of Parallel and Distributed Computing
Qualitative and quantitative analysis and comparison of Java distributed architectures
Software—Practice & Experience
Self-prevention of socket buffer overflow
Computer Networks: The International Journal of Computer and Telecommunications Networking
Network smart card review and analysis
Computer Networks: The International Journal of Computer and Telecommunications Networking
XTP as a transport protocol for distributed parallel processing
HSNS'94 Proceedings of the High-Speed Networking Symposium on USENIX 1994 High-Speed Networking Symposium
Quality-of-Service Methods for Managing Communicating Applications
Integrated Computer-Aided Engineering
Quagga based implementation of compound routing metrics for distance vector routing algorithms
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
SEED: A Suite of Instructional Laboratories for Computer Security Education
Journal on Educational Resources in Computing (JERIC)
Rule-based static analysis of network protocol implementations
Information and Computation
Measurement and analysis of TCP throughput collapse in cluster-based storage systems
FAST'08 Proceedings of the 6th USENIX Conference on File and Storage Technologies
A service oriented framework for wireless communication in mobile multi robot systems
Proceedings of the 1st international conference on Robot communication and coordination
Problem verification during execution of H.323 signaling
TELE-INFO'08 Proceedings of the 7th WSEAS International Conference on Telecommunications and Informatics
An active distributed medical advisory system
SEPADS'08 Proceedings of the 7th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems
A Monitoring Module for a Streaming Server Transmission Architecture
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part I
RoSe - A framework for multicast communication via unreliable networks in multi-robot systems
Robotics and Autonomous Systems
Improved algorithms for Internet routing in Low Earth Orbit satellite networks
Space Communications - Satellite Network Protocols
Embedded fuzzy expert system for Adaptive Weighted Fair Queueing
Expert Systems with Applications: An International Journal
A fast and scalable IPv4 and 6 address lookup algorithm
Computer Communications
Application Management Framework in User Centric Smart Card Ownership Model
Information Security Applications
Simulated attacks on CAN buses: vehicle virus
AsiaCSN '08 Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks
A novel approach for resource allocation in broadband access networks
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Improvement of TCP performance over optical burst switching networks
ONDM'07 Proceedings of the 11th international IFIP TC6 conference on Optical network design and modeling
Improving TCP performance over mobile ad hoc networks
International Journal of Internet Technology and Secured Transactions
Design and implementation of boundary-scan test system based on network interface card
CAR'10 Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 1
A generalized greedy routing algorithm for 2-connected graphs
Theoretical Computer Science
Embedded network protocols for mobile devices
FMICS'10 Proceedings of the 15th international conference on Formal methods for industrial critical systems
Abstractions for designing and evaluating communication bridges for people in developing regions
Proceedings of the First ACM Symposium on Computing for Development
Secure data transmission using steganography based data hiding in TCP/IP
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
A new control architecture for optical burst switching networks
ICCOM'06 Proceedings of the 10th WSEAS international conference on Communications
Building Secure Tunnel from PPP Wireless Network
Wireless Personal Communications: An International Journal
The resource efficient forwarding in the content centric network
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part I
A binary graph reduction algorithm for multi-constrained QoS routing
Proceedings of the Second Asia-Pacific Symposium on Internetware
Greedy routing via embedding graphs onto semi-metric spaces
FAW-AAIM'11 Proceedings of the 5th joint international frontiers in algorithmics, and 7th international conference on Algorithmic aspects in information and management
Digital Ecosystems: Ecosystem-Oriented Architectures
Natural Computing: an international journal
Recovering extra routes with the path from loop recovery protocol
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
The design of firewall based on intel IXP2350 and autopartitioning mode c
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
On succinct convex greedy drawing of 3-connected plane graphs
Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete Algorithms
MEDADVIS: a medical advisory system
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
A network service access control framework based on network blocking algorithm
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Schnyder greedy routing algorithm
TAMC'10 Proceedings of the 7th annual conference on Theory and Applications of Models of Computation
SP 800-52. Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations
SP 800-52. Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations
Greedy routing via embedding graphs onto semi-metric spaces
Theoretical Computer Science
International Journal of Monitoring and Surveillance Technologies Research
Hi-index | 0.01 |
From the Publisher:THIS NEW EDITION OF VOLUME 1: Explains how voice and video are sent over IP internets and how IP Telephony operates Describes Mobile IP (a technology that allows a computer to move from one network to another without changing its IP address) Discusses IP security and the security standard, IPsec Revises the discussion of Ipv6 to incorporate the latest changes Shows how to interconnect private intranets and the global Internet using Virtual Private Network (VPN) and Network Address Translation (NAT) technologies Expands the description of IP multicasting to cover multicast routing protocols Presents the Differentiated Services (DiffServe) scheme for classes of services as well at Path MTU discovery and routing for anonymous serial networks Explains Random Early Discard (RED), which is now recommended for routers Updates the coverage of all protocols to the latest versions, including RIP, IGMP, and SNMP