JN Guichard, WS Wainner, BE Weis - US Patent 8,713,669, 2014 - Google Patents
Abstract Systems and/or methods of secure communication of information between multi- domain virtual private networks (VPNs) are presented. A dynamic group VPN (DGVPN) can …
This paper describes a framework for constructing network services for accessing media objects. The framework, called end-to-end media paths, provides a new approach for …
Allocating bandwidth for a certain period of time is an often encountered problem in networks offering some kind of quality of service (QoS) support. In particular, for aggregate …
O Heckmann - Ausgezeichnete Informatikdissertationen 2004, 2005 - dl.gi.de
Diese Dissertation untersucht, wie man die Effizienz und Dienstgüte eines IP Netzwerkes aus der Sicht eines Internet Netzwerkbetreibers optimieren kann und sollte. Da die …
Networks have experienced a dramatic growth in size and functionality in the past years: network nodes not only forward datagrams using longest-prefix matching of the destination …
O Heckmann, J Schmitt… - ½¼ Ø International …, 2000 - researchgate.net
The Internet consists of a variety of interconnected heterogeneous networks managed by independent providers. At the edges between two networks resources are allocated. In this …
M El-Darieby, J Rolia, DC Petriu - 2001 IEEE/IFIP International …, 2001 - ieeexplore.ieee.org
One of the goals of network service providers (SP) is to provision efficiently value-added networking services to their end users. The services may have different duration …
R Haas, P Droz, B Stiller - 12th IEEE/IFIP International …, 2001 - research.utwente.nl
This paper presents the elements of a framework enabling QoS-aware service deployment over programmable heterogeneous networks. For ease of service deployment, it is expected …
P Butler, A Rhodes, R Hasan - 2012 IEEE Fifth International …, 2012 - ieeexplore.ieee.org
Malware and computer forensic researchers often communicate with malicious servers, either directly or indirectly, through the web browser or other ports utilized by malicious …