48 results on '"Computer network protocols -- Analysis"'
Search Results
2. Secure key agreement protocols for three-party against guessing attacks
3. Contact-extended zone-based transactions routing for energy-constrained wireless ad hoc networks
4. A two-zone hybrid routing protocol for mobile ad hoc networks
5. On causal broadcasting with positive acknowledgments and bounded-length counters
6. Communication state transfer for mobility of concurrent heterogeneous computing
7. Transmission power control in wireless ad hoc networks: Challenges, solutions, and open issues
8. Reliable message delivery for mobile agents: push or pull?
9. Policy-enabled mechanisms for feature interactions: reality, expectations, challenges
10. An efficient TDMA start-up and restart synchronization approach for distributed embedded systems
11. Exploring virtual network selection algorithms in DSM cache coherence protocols
12. A novel algorithm for multimedia multicast routing in a large scale network
13. Adaptive message scheduling for supporting casual ordering in wide-area group communications
14. Abstract communication model for distributed systems
15. Spatial-temporal correlation: theory and applications for wireless sensor networks
16. TCP and UDP performance for Internet over optical packet-switched networks
17. Modelling and verification of interworking between SIP and H.323
18. On the performing analysis of ABR in ATM LANs with Stochastic Petri Nets
19. On characterizing BGP routing table growth
20. Represent the Internet as a succinct forest
21. Mobile hop-by-hop multicast routing
22. Fully automated interoperability test suite derivation for communication protocols
23. Mediators of the effectiveness of online courses
24. Joint lossless-source and channel coding using ARQ/Go-Back- (N, M) for image transmission
25. Experimental evaluation of a bandwidth allocation scheme for foundation field bus.
26. Protocols for negotiating complex contracts
27. On approximation of the bulk synchronous task scheduling problem
28. Web developers continue to focus on interoperability
29. A scalable and distributed multicast security protocol using a subgroup-key hierarchy
30. The secure shell game
31. Remotely controlling windows applications
32. Using SOAP extensions in ASP.NET
33. Biometric random number generators
34. Voice over WLAN analysis is the key to success: with VoIP comes the notion to run voice on 802.11 wireless LANs (WLANs). But to succeed, Voice over WLAN (VoWLAN) deployments need very careful planning and continuous monitoring
35. IPv6: Built for speed
36. Software tools for networking
37. AdaptNet: an adaptive protocol suite for the next-generation wireless Internet
38. Automatic rate adaptation and energy-saving mechanisms based on cross-layer information for packet-switched data networks
39. Positioning of the RPR standard in contemporary operator environments
40. A framework for resilient Internet routing protocols
41. Ubiquitous computing in home networks
42. Voice over MPLS compared to voice other packet transport technologies
43. Gateways- just as important as standards: how the Internet won the 'Religious War' over standards in Scandinavia
44. Why SIP Will Win the VoIP War
45. The SOA Ecosystem
46. SIP Goes Prime Time -- Telecom vendors are supporting it. Enterprises are asking for it. Is now the time to deploy VoIP's hottest protocol?
47. Protocol analyzers rise to net challenges
48. Real life convergence: what's the reality of converged networks? How have organisations really benefited so far, and do they get the functionality and cost savings that their suppliers promise? Communicate investigates the highs and lows of implementing an IP telephony solution
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.