Computer Network
24,278 Followers
Recent papers in Computer Network
Wireless body area networks (WBANs) a special type of wireless sensor networks (WSNs) in which sensor nodes to actualize continuous wearable wellbeing observing of patients are able to provide improved healthcare services in a distributed... more
We compare the concept of congestion avoidance with that of ow control and congestion control. A number of possible alternative for congestion avoidance have been identi ed. From these a few were selected for study. The criteria for... more
A new practical approach to sensitivity analysis of the network parameters of high-frequency structures with commercial full-wave electromagnetic (EM) solvers is proposed. We show that the computation of the linear-network parameter... more
We obtain equivalencies between closed queueing networks with blocking with respect to buffer capacities and the number of customers in the network. These results can be used in approximations, in the buffer allocation problem as well as... more
In the view of escalating global threat in security, it is imperative to have an automated detection system that can pick up suspicious patterns of human movement in physical environments. It can give a forewarning before a planned attack... more
Recent measurements show that BGP peering links can fail as frequently as intradomain links and usually for short periods of time. We propose a new fast-reroute technique where routers are prepared to react quickly to interdomain link... more
Ad hoc mobile clouds would be suitable for spontaneous ad hoc networks created in situations where the mobile infrastructures are very pervasive and where the interconnection to an infrastructure network is very costly. The advantages of... more
In order to maximize the network's lifetime and ensure the connectivity among the nodes, most topology management practices use a subgroup of nodes for routing. This paper provides an in-depth look at existing topology management control... more
In Wireless Sensor Networks (WSNs), energy consumption is the most challenging issue. The more energy is consumed during captured data transmission than the local data processing at sensor nodes. Because of this reason network lifetime is... more
We developed a networked virtual reality system on which one could have live videoes with high iteractive usage. However, since a client in our system receives both live videoes and computer graphics objects continuously from a server... more
new distributed algorithm is presented for dynamically determining weighted shortest paths used for message routing in computer networks. The major features of the algorithm are that the paths .defined do not form transient loops when... more
Queueing systems in which arriving customers who find all servers and waiting positions (if any) occupied may retry for service after a period of time are called retrial queues or queues with repeated orders. Retrial queues have been... more
— In most of the organizations it is highly desirable to perform different tasks on different machines based on their configuration and permissions assigned to the machines for execution of different tasks. This can be achieved by... more
Image Puzzle" is an interactive puzzle game made with the help of the Small Basic programming language. It combines both logical thinking and speed and is suitable for everyone who wishes to have a little break from it all or just some fun.
An essential function for achieving security in computer networks is reliable authentication of communicating parties and network components. Such authentication typically relies on exchanges of cryptographic messages between the involved... more
The area of visualization has ,always been one of the ,most attractive sections of network management,technology. Successful management,tools must not only fulfill objective management needs but also be aestheticallyappealing.... more
An electronic voting system makes it possible for the voters to cast their ballots over the computer network. Hence, voters 11 can participate in elections without having to go to the polling places, which is more convenient and... more
Ethernet is a branching broadcast communication system for carrying digital data packets among locally distributed computing stations. The packet transport mechanism provided by Ethernet has been used to build systems which can be viewed... more
The work culture in libraries has changed due to the growth of computer networks and the World Wide Web. The growth of interest in knowledge management (KM) has essentially been contemporary with that of intranets/extranets. It is no... more
This paper proposes a new approach for reducing average call delivery cost and location server's load of wireless mobile networks. It uses caches whose up-todate information is responsible for dropping these costs and these caches are... more
Mobile ad-hoc networks (MANETs) consist of special kind of wireless mobile nodes which form a temporary network without using any infrastructure or centralized administration. MANETs can be used in wide range of future applications as... more
The future for WiMAX-based mobile wireless access is so bright. With the increasing popularity of WiMAX, it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not... more
Abstract: Education can benefit from the use of technology in the teaching process. This has been done in the past using various technologies. In recent years, computers, information systems, multimedia and hypertext systems have been... more
A rich computing and communications environment, providing access to a wide variety of computational resources and communications services, can significantly improve the productivity of engineers
With the rapid advance of mobile computing, high speed Wireless Local Area Networks (LAN) attracts a lot of research interests in recent years. A new international stander IEEE 802.11 on wireless LAN has been established. Its physical... more
ABSTRACT This article deals with the role of server operating systems (SOS) in sustaining availability and reliability of contemporary E-business. A framework that can be used in identifying the most critical SOS functions and selecting... more
Context awareness has been a vital field of ubiquitous computing research. Numerous methods for capturing, interring external context and providing necessary service have been developed and relevant projects have been performed. However,... more
Recent attention to Cyber Physical Systems (CPS) is driven by the need for deeper integration of design disciplines that dominate physical and computational domains. Consequently, heterogeneity is the norm as well as the main challenge in... more
The digital revolution that has been taking place for the past two decades propelled by major breakthroughs in the ICT field has changed the way we communicate, work, travel, live-and even the way we use public space. Our cities are... more
8th International Conference on Computer Networks & Data Communications (CNDC 2021) will provide an excellent international forum for sharing knowledge and results in theory and applications of Computer Networks and Data Communications.... more
The technologies, architectures, and methodologies traditionally used to develop distributed applications exhibit a variety of limitations and drawbacks when applied to large scale distributed settings (e.g., the Internet). In particular,... more
This paper presents an extension of MOVICAB-IDS, a Hybrid Intelligent Intrusion Detection System characterized by incorporating temporal control to enable real-time processing and response. The original formulation of MOVICAB-IDS combines... more
Cloud computing enables a transparent access to information technology (IT) services such that the users do not need to know the location and characteristics of the relevant resources. While IT resource virtualization and service... more
The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. In this... more
Modeling computer networks is a complex task, as their behavior depends from several variables. Focusing on a single communication device, ISO/OSI and TCP/IP layered protocol stacks provide interoperability and fast deployment of... more
Stochastic simulation is an important aid for the design and performance engineering of computer networks. The credibility of simulative results can, however, be seriously affected by human errors (e.g., inconsistencies in the parameter... more
We introduce a compact graph-theoretic representation for multi-party game theory. Our main result is a provably correct and efficient algorithm for computing approximate Nash equilibria in one-stage games represented by trees or sparse... more
The Reference Model of Open Distributed Processing (RM -ODP) was a joint effort by the international standards bodies ISO and ITU-T to develop a coordinating framework for the standardisation of open distributed p~ocessing (ODP). The... more