Skip to main content
    • by 
    •   18  
      Computer ScienceInformation TechnologyComputer NetworksNetwork Management
    • by 
    •   9  
      Voice over IPQuality of ServiceBandwidth AllocationTraffic Flow
    • by 
    •   7  
      Combined Cycle Power PlantsTRNSYS simulationCSPISCC
    • by 
    •   4  
      Quality of ServiceISCCDynamic Channel AllocationChannel Capacity
    • by 
    •   16  
      Computer ScienceSpineStatistical AnalysisPacket Switching
    • by  and +1
    •   9  
      Resource AllocationGroup communicationConceptual analysisISCC
Active Queue Management (AQM) policies are mechanisms for congestion avoidance, which pro-actively drop packets in order to provide an early congestion notification to the sources. Random Early Detection (RED), the defacto standard and... more
    • by 
    •   5  
      Congestion AvoidanceISCCActive Queue ManagementRandom Early Detection
    • by 
    •   9  
      Open Source SoftwareSocial InteractionVirtual CommunityBusiness Model
    • by  and +1
    •   6  
      ComputersMobile CodeISCCTask Complexity
    • by 
    •   2  
      ISCCElectronic Commerce
Abstract — Most Unix systems provide a set of system calls that allow applications to interact with the network directly. These primitives are useful for example in packet capture applications, which need to grab the data flowing through... more
    • by 
    •   3  
      OPERATING SYSTEMISCCData Flow Diagram
In order to support mobile users, the basic Internet protocols have been extended with protocols (eg, Mobile IPv6) for intercepting and forwarding packets to a mobile and possibly roaming node. Seamless roaming requires that users and... more
    • by 
    • ISCC
Air pollution levels remain high in Poland, whereas in other European countries they decrease. There are different reasons for that. Oil and gas industry, fossil fuel production and consumption are some of them. The state attempts to... more
    • by 
    •   20  
      European StudiesEnvironmental EconomicsPublic EconomicsRenewable Energy
File type identification and file type clustering may be difficult tasks that have an increasingly importance in the field of computer and network security. Classical methods of file type detection including considering file extensions... more
    • by 
    •   14  
      Network SecurityPrincipal Component AnalysisComputer SecurityNeural Network
    • by 
    •   15  
      Fuzzy LogicFuzzy Logic ControlCongestion ControlQueueing theory
    • by 
    •   9  
      EarthSatellite CommunicationLabelingDecoding
    • by 
    •   6  
      Resource AllocationDynamic controlISCCResource Reservation
    • by 
    •   8  
      Wireless CommunicationsComputer NetworksQuality of ServiceISCC
Abstract The mobile IPv6 handover process consists of three major stages: movement detection, duplicate address detection and binding signaling. Most of the research efforts for optimizing the handover process focuses on minimizing the... more
    • by 
    •   13  
      Computer ScienceSignal ProcessingMobile CommunicationMobile Computing
A common way to protect objects in distributed systems is to issue authorization certificates to users, which they present to gain access. In some situations a way is needed to revoke existing certificates. Current methods, such as having... more
    • by 
    •   8  
      Computer ScienceTrustDistributed SystemDIGITAL CERTIFICATES
    • by 
    •   13  
      Ubiquitous ComputingWireless Sensor NetworksSynchronizationData Structure
    • by 
    •   5  
      Congestion AvoidanceISCCActive Queue ManagementRandom Early Detection
    • by 
    •   9  
      System DesignEmergency ResponseData CollectionSensor Network
    • by 
    •   13  
      OntologySemanticsUbiquitous ComputingInternet of Things
    • by 
    •   13  
      Computer ScienceCongestion ControlStabilityISCC
    • by 
    •   13  
      Ubiquitous ComputingWireless Sensor NetworksSynchronizationData Structure
A fast-growing number of high-layer protocols, ser- vices and networked applications has been run over computer networks and needs to be managed. A uni- fled, decentralized framework should be used to scale for the current large and... more
    • by  and +2
    •   4  
      Computer NetworkService managementISCCNetwork Traffic
    • by  and +1
    •   9  
      Routing protocolsOPERATING SYSTEMMobile Ad Hoc NetworkWireless Network
    • by 
    •   14  
      Data CompressionCommunication NetworksFractalsReflection
    • by 
    •   4  
      Bandwidth AllocationISCCIncentive CompatibilityDegree of Freedom
    • by  and +1
    •   12  
      Computer ScienceReconfigurable ComputingFlow ControlSoftware Design
    • by 
    •   6  
      Resource AllocationDynamic controlISCCResource Reservation
    • by 
    •   10  
      ConvergenceComparative StudyReal Time SystemsFluctuations
    • by 
    •   7  
      Nonlinear ProgrammingWireless Sensor NetworksEnergy SavingSensor Network
    • by 
    •   21  
      Wireless CommunicationsComputer NetworksData CompressionWireless Mesh Networks
... Andrea Detti, Giuseppe Bianchi, Claudio Pisa, Francesco Saverio Proto, Pierpaolo Loreti University of Rome Tor Vergata {andrea.detti, claudio.pisa}@uniroma2.it ... More specifically, H.264 SVC introduces three enhancement di-mensions:... more
    • by 
    •   10  
      Open SourcePerformance EvaluationScalable Video CodingReal Time
... This is called a Gray Hole. ... The implementation is such to provide support to the dynamism of the Trust Management System. ... It is again important to remember at this point, that at a particular time we are simulating a single... more
    • by 
    •   20  
      Black HolesTechnology ManagementEnvironmental ManagementRouting
The mobile Internet is enabling a broad range of new applications that dynamically obtain information that is relevant to their current location. This type of application would greatly benefit from generic mechanisms for supporting the... more
    • by 
    •   19  
      Information SystemsComputer ScienceDistributed ComputingLocation Based Services
Abstract Deployment and configuration of grid computing applications are exhaustive and error-prone tasks, and represent a weak link of the lifecycle of grid applications. To address the problem, this paper proposes AGRADC, an... more
    • by 
    •   14  
      MathematicsComputer ScienceComputer ArchitectureGrid Computing
    • by 
    •   13  
      Wireless Sensor NetworksFault DetectionOntologiesInteroperability
    • by 
    •   10  
      Computer ScienceComputer NetworksWireless Sensor NetworksSensor Network Security
    • by 
    •   10  
      InformaticsResource AllocationTraffic EngineeringProtocols
    • by 
    •   8  
      Engineering ManagementRoutingReliability EngineeringMultimedia Communication
    • by 
    •   13  
      Ubiquitous ComputingWireless Sensor NetworksSynchronizationData Structure
    • by 
    •   14  
      Human Computer InteractionWireless Sensor NetworksAmbient IntelligenceFace Detection
    • by  and +1
    •   3  
      ISCCClient ServerCommunity Networks
    • by 
    •   12  
      SemanticsUbiquitous ComputingComputational ModelingPervasive Computing
    • by 
    •   7  
      Video GameFuture InternetVirtual RealityISCC
    • by 
    •   9  
      Computer ScienceDynamic Software AdaptationPower ControlISCC
    • by 
    •   9  
      PackagingRouting protocolsNavigationQuality of Service