Browsing by Subject "Network management"
Now showing items 1-13 of 13
-
Conference Object
ADIVIS: A novel adaptive algorithm for video streaming over the internet
(2007)The transfer of information over the wireless networks is emerging as a promising business model. In addition, new applications require the transfer of video content in real time. However, the unpredictable nature of ...
-
Article
A clustering-based prefetching scheme on a Web cache environment
(2008)Web prefetching is an attractive solution to reduce the network resources consumed by Web services as well as the access latencies perceived by Web users. Unlike Web caching, which exploits the temporal locality, Web ...
-
Article
The complexity of synchronous iterative do-all with crashes
(2001)Do-All is the problem of performing N tasks in a distributed system of P failure-prone processors [8]. Many distributed and parallel algorithms have been developed for this problem and several algorithm simulations have ...
-
Article
Context aware multiparty session support for adaptive multicasting in heterogeneous mobile networks
(2009)The paper addresses the issue of achieving context-aware, adaptive multiparty sessions in a heterogeneous system by illustrating how to add elements of adaptivity and context-awareness to the session management functionality ...
-
Article
Context-aware self-optimization in multiparty converged mobile environments
(2010)The increase of networking complexity requires the design of new performance optimization schemes for delivering different types of sessions to users under different conditions. In this scope, special attention is given ...
-
Article
In-network data acquisition and replication in mobile sensor networks
(2011)This paper assumes a set of n mobile sensors that move in the Euclidean plane as a swarm. Our objectives are to explore a given geographic region by detecting and aggregating spatiooral events of interest and to store these ...
-
Article
Multimodal Dynamic Freight Load Balancing
(2016)The urban traffic network has temporal and spatial characteristics whose changing conditions have often unpredictable effects on the flow of loads that include passengers and freight. As a result, the current traffic network ...
-
Article
Optimal, distributed decision-making: The case of no communication
(1999)We present a combinatorial framework for the study of a natural class of distributed optimization problems that involve decisionmaking by a collection of n distributed agents in the presence of incomplete information
-
Conference Object
Security in future mobile sensor networks - Issues and challenges
(2010)Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that ...
-
Conference Object
Security in future mobile sensor networks - Issues and challenges
(2010)Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that ...
-
Article
Security in the cache and forward architecture for the next generation Internet
(2011)The future Internet architecture will be comprised predominately of wireless devices. It is evident at this stage that the TCP/IP protocol that was developed decades ago will not properly support the required network ...
-
Article
Supporting increment and decrement operations in balancing networks
(1999)Counting networks are a class of distributed data structures that support highly concurrent implementations of shared Fetch&Increment counters. Applications of these counters include shared pools and stacks, load balancing, ...
-
Conference Object
Using argumentation logic for firewall configuration management
(2009)Firewalls remain the main perimeter security protection for corporate networks. However, network size and complexity make firewall configuration and maintenance notoriously difficult. Tools are needed to analyse firewall ...