Results 41 to 50 of about 43,044 (189)

Context Aware Handover Algorithms For Mobile Positioning Systems

open access: yesComputer Science, 2014
: This work proposes context aware handover algorithms for mobile positioning systems. The algorithms perform handover among positioning systems based on important contextual factors related to position determination with efficient use of battery.
Sazid Z. Khan   +4 more
doaj   +1 more source

On Implementing IPTV Platform with IPv4 and IPv6 Devices

open access: yesJournal of Telecommunications and Information Technology, 2023
The end of IPv4 addresses is now a reality. Providers not updated to IPv6 will have to hurry up the IPv6 start in its own network. Introduction of IPv6 means not only change of main routers but also change of mentality in operators, applications ...
Jordi Mongay Batalla, Piotr Krawiec
doaj   +1 more source

Effectiveness of an Entropy-Based Approach for Detecting Low- and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis

open access: yesApplied Sciences, 2023
Software-defined networking (SDN) is a unique network architecture isolating the network control plane from the data plane, offering programmable elastic features that allow network operators to monitor their networks and efficiently manage them. However,
Mohammad Adnan Aladaileh   +6 more
doaj   +1 more source

Multi-homing tunnel broker [PDF]

open access: yes, 2004
A proper support for communications has to provide fault tolerance capabilities such as the preservation of established connections in case of failures.
Azcorra, Arturo   +3 more
core   +3 more sources

A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley   +1 more source

A Survey Of IPv6 Address Usage In The Public Domain Name System [PDF]

open access: yes, 2014
The IPv6 protocol has been slowly increasing in use on the Internet. The main reason for the development of the protocol is that the address space provided by IPv4 is nearing exhaustion.
Carpene, Clinton R, Woodward, Andrew J
core   +1 more source

Artificial Intelligence Applications in Smart Cities: Integrating Communication, Energy Management, Cybersecurity and Internet of Things

open access: yesThe Journal of Engineering, Volume 2026, Issue 1, January/December 2026.
ABSTRACT Smart cities represent transformative urban ecosystems, leveraging advanced technologies to address challenges posed by rapid urbanisation, energy efficiency demands, and sustainability goals. Despite extensive research, a comprehensive and integrated literature analysis combining AI‐based communication, energy management, cybersecurity, and ...
Maaz Tahir Malik   +5 more
wiley   +1 more source

Case Study - IPv6 based building automation solution integration into an IPv4 Network Service Provider infrastructure [PDF]

open access: yes, 2012
The case study presents a case study describing an Internet Protocol (IP) version 6 (v6) introduction to an IPv4 Internet Service Provider (ISP) network infrastructure.
Bogomilov, Ivan, Milovanov, Nikolay
core  

A Proposed Method for TCAM Optimization in SDN

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
OpenFlow, a key data plane protocol in software‐defined networking (SDN), relies heavily on ternary content addressable memory (TCAM) to achieve high‐speed packet matching. However, as OpenFlow evolves to support a broader set of match fields, the demand for TCAM storage grows significantly due to its support for arbitrary wildcards.
Tariq Emad Ali   +3 more
wiley   +1 more source

Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks

open access: yesIEEE Access, 2020
Vehicle Ad hoc Networks (VANETs) are an emergent wireless communication technology that has the potential to reduce the risk of accidents caused by drivers and provide a wide range of entertainment facilities. Because of the nature of VANETs' open-access
Mahmood A. Al-Shareeda   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy