author: paul dowland

Proceedings of the Fourth International Network Conference 2004 (INC2004)

... protocol in the backbone to TCP in the access network, we have used emulation. Since the throughput of the TCP-friendly protocol and TCP will be different, a proxy implementation has four means of handling ... server until the access network ...

Proceedings of the Third International Network Conference (INC2002)

... Internet Computing , pp . 33-39 , vol . 3 , no . 2 . Metz , C. ( 2000 ) , " IP over 2000 : Where Have We Been and Where Are We Go ing ? " IEEE Internet Computing , vol . 4 , no . 1 . Metz , C. ( 2000 ) , “ IP - over - Satellite : Internet ...

Proceedings of the 11th IFIP TC 11.1 Working Conference on Information Security Management

... ppt, Accessed 10 July 2006. CRAMM (2006), “Overview: How it works”, Insight ... Systems Security Auditing”, 10 December 2001, URL: http://www.gao.gov/special ... Development Life Cycle”, SANS Institute, 12 January 2005, URL: http://www ...

Advances in Communications, Computing, Networks and Security Volume 9

... signing up to Facebook for the first time all settings are set to share with everyone. In addition, upon implementation of new features, Facebook automatically enrols users into the new service, one of which called 'instant ...

Proceedings of the Ninth International Network Conference (INC 2012)

... SANET. Constraints and non-functional attributes of the SANET controlling the. Figure 1: (a) SANET-based Conveyor Belt System and (b) Integration of Resource Management with Subscription Manager Figure 2: Publish-Subscribe-Mechanism ...

Advances in Communications, Computing, Networks and Security Volume 7

... malware. This paper details a research undertaken to investigate the effectiveness of present day anti ... Malwarebytes 1.39 Panda 9.00.00 Sophos 7.6.10 Vipre 3.1.2775 Webroot 6.1 ... keys by the program and to monitor the state of the system ...

Advances in Communications, Computing, Networks and Security Volume 11

... TETRIX parts and motors. Tested the vehicle to analyze its capable to ... Robot Operating System”, http://www.ros.org/wiki (Accessed 04-06-2013) ... Robot Navigation”, 1-4244-0038-4 2006 IEEE CCECE/CCGEI, Ottawa TETRIX (2013), “TETRIX Kit ...

Advances in Networks, Computing and Communications 3

... end user security knowledge, while it needs to commensurate with the threats posed against it and the cost of securing it. The ultimate security solution should rely on a centric framework that improves the network ... devices. An appropriate ...

Advances in Communications, Computing, Networks and Security 5

... 2007) CSIA (2007), “Key organisations”, Central Sponsor for Information Assurance, Cabinet Office, http://www.cabinetoffice.gov.uk/csia/key_organisations (accessed 12/08/2007) Espiner, T. (2006), “ID theft gang thwarts police with ...

Proceedings of the Eleventh International Network Conference (INC 2016)

... BluetoothChat source code, available on GitHub website [9], a code example available to demonstrate the use of Bluetooth Android API that can be run by two Android devices at the same time, to establish chat over Bluetooth between these ...

Advances in Communications, Computing, Networks and Security Volume 8

Paul Dowland, Steven Furnell. for both the regular and irregular form of LDPC codes ... (ALT) algorithm contains the parity check matrix of the LDPC code which is ... O(n+g2). The only disadvantage with the ALT algorithm is that there is no ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.