default search action
Journal of High Speed Networks, Volume 15
Volume 15, Number 1, 2006
- Suresh Subramaniam, Krishna M. Sivalingam, G. Manimaran:
Selected papers from Trusted Internet Workshop (TIW) 2004. 1-3 - Yih Huang, David Arsenault, Arun Sood:
SCIT-DNS: Critical infrastructure protection through secure DNS server dynamic updates. 5-19 - Olga Gelbart, Bhagirath Narahari, Rahul Simha:
SPEE: A Secure Program Execution Environment tool using code integrity checking. 21-32 - Vijay Bhuse, Ajay Gupta:
Anomaly intrusion detection in wireless sensor networks. 33-51 - B. Venkata Ramana, B. S. Manoj, C. Siva Ram Murthy:
AR-TCP: A Loss-Aware Adaptive Rate based TCP for Ad hoc Wireless Networks. 53-72 - Mohammed A. Moharrum, Ravi Mukkamala, Mohamed Eltoweissy:
A novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks. 73-92 - Manel Guerrero Zapata:
Key management and delayed verification for Ad hoc networks. 93-109
Volume 15, Number 2, 2006
- Yen Chieh Ouyang, Ching-Wen Yang, Wei Shi Lian:
Neural networks based variable bit rate traffic prediction for traffic control using multiple leaky bucket. 111-122 - Baoxian Zhang, Hussein T. Mouftah:
Destination-driven shortest path tree algorithms. 123-130 - Galia Shabtai, Israel Cidon, Moshe Sidi:
Two priority buffered multistage interconnection networks. 131-155 - Khaled Salah, K. El-Badawi:
Throughput-delay analysis of interrupt-driven kernels with DMA enabled and disabled in high-speed networks. 157-172 - Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy:
Convergence of IPsec in presence of resets. 173-183 - Haci A. Mantar, Ibrahim T. Okumus, Junseok Hwang, Steve J. Chapin:
A scalable intra-domain resource management architecture for DiffServ networks. 185-205
Volume 15, Number 3, 2006
- Managing security policies: Modeling, verification and configuration. 207-208
- Hazem H. Hamed, Ehab Al-Shaer:
On autonomic optimization of firewall policy organization. 209-227 - Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington:
Client-side access control enforcement using trusted computing and PEI models. 229-245 - Romain Laborde, François Barrère, Abdelmalek Benzekri:
Network security policy refinement process: Expression and analysis. 247-260 - Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart:
Reconfiguring Role Based Access Control policies using risk semantics. 261-273 - Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shyhtsun Felix Wu:
IPsec/VPN security policy correctness and assurance. 275-289 - Alan Ganek, Anthony J. Nadalin, Nataraj Nagaratnam, Dinesh Verma:
An autonomic approach for managing security and identity management policies in enterprises. 291-300 - Simon N. Foley, Barry P. Mulcahy, Thomas B. Quillinan, Meabh O'Connor, John P. Morrison:
Supporting heterogeneous middleware security policies in WebCom. 301-313 - Lu'ay A. Wahsheh, Jim Alves-Foss:
Specifying and enforcing a multi-policy paradigm for high assurance multi-enclave systems. 315-327
Volume 15, Number 4, 2006
- Chu-Chuan Lee, Pao-Chi Chang:
Integrated traffic modeling and frame skipping for pre-stored streaming videos over cellular networks. 329-340 - Maria Rizzi, Beniamino Castagnolo:
Modelling and simulation of a large strictly nonblocking fault-tolerant network. 341-355 - Mingsheng Peng, Sarangapani Jagannathan, S. R. Subramanya:
Rate-based end-to-end congestion control of multimedia traffic in packet switched networks. 357-378 - Lan Kong, Maher Ali, Jitender S. Deogun:
Building Redundant Multicast Trees for Preplanned Recovery in WDM optical networks. 379-398 - Anwar Alyatama:
Computing the equivalent Poisson traffic for the Wavelength Decomposition Method. 399-414 - Mário M. Freire, Henrique J. A. da Silva:
Assessment of blocking performance in WDM chordal ring networks. 415-432 - Girish V. Chowdhary, C. Siva Ram Murthy:
Efficient routing of sub-wavelength multicast sessions in WDM mesh networks. 433-454
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.