ISCC
4 Followers
Recent papers in ISCC
Active Queue Management (AQM) policies are mechanisms for congestion avoidance, which pro-actively drop packets in order to provide an early congestion notification to the sources. Random Early Detection (RED), the defacto standard and... more
Abstract Most Unix systems provide a set of system calls that allow applications to interact with the network directly. These primitives are useful for example in packet capture applications, which need to grab the data flowing through... more
In order to support mobile users, the basic Internet protocols have been extended with protocols (eg, Mobile IPv6) for intercepting and forwarding packets to a mobile and possibly roaming node. Seamless roaming requires that users and... more
Air pollution levels remain high in Poland, whereas in other European countries they decrease. There are different reasons for that. Oil and gas industry, fossil fuel production and consumption are some of them. The state attempts to... more
File type identification and file type clustering may be difficult tasks that have an increasingly importance in the field of computer and network security. Classical methods of file type detection including considering file extensions... more
Abstract The mobile IPv6 handover process consists of three major stages: movement detection, duplicate address detection and binding signaling. Most of the research efforts for optimizing the handover process focuses on minimizing the... more
A common way to protect objects in distributed systems is to issue authorization certificates to users, which they present to gain access. In some situations a way is needed to revoke existing certificates. Current methods, such as having... more
... Andrea Detti, Giuseppe Bianchi, Claudio Pisa, Francesco Saverio Proto, Pierpaolo Loreti University of Rome Tor Vergata {andrea.detti, claudio.pisa}@uniroma2.it ... More specifically, H.264 SVC introduces three enhancement di-mensions:... more
... This is called a Gray Hole. ... The implementation is such to provide support to the dynamism of the Trust Management System. ... It is again important to remember at this point, that at a particular time we are simulating a single... more
The mobile Internet is enabling a broad range of new applications that dynamically obtain information that is relevant to their current location. This type of application would greatly benefit from generic mechanisms for supporting the... more
Abstract Deployment and configuration of grid computing applications are exhaustive and error-prone tasks, and represent a weak link of the lifecycle of grid applications. To address the problem, this paper proposes AGRADC, an... more