Roma Tre University

Displaying 1-5 of 5 results

  • White Papers // Jan 2012

    iBGP Deceptions: More Sessions, Fewer Routes

    Internal BGP (iBGP) is used to distribute inter-domain routes within a single ISP. The interaction between iBGP and the underlying IGP can lead to routing and forwarding anomalies. For this reason, several research contributions aimed at defining sufficient conditions to guarantee anomaly-free configurations and providing design guidelines for network operators....

    Provided By Roma Tre University

  • White Papers // Mar 2010

    Dynamic QoS Evaluation of Multimedia Contents in Wireless Networks by "Double-Boomerang" Watermarking

    This paper presents a cooperative network-aware processing of multimedia content for dynamic quality of service management in wireless IP networks. The technique can be also used for quality control in UMTS environments, exploiting the tracing watermarking recently introduced in literature. In this paper, the authors use the transmitted video-sequences to...

    Provided By Roma Tre University

  • White Papers // Feb 2010

    Hierarchies of Keys in Secure Multicast Communications

    This paper considers the key management for secure multicast in the Logical Key Hierarchy (LKH) model and proposes a methodology to establish the minimal key bit length that guarantees a specified degree of confidentiality for the multicast communications managed within this model. The authors also introduce the concepts of information...

    Provided By Roma Tre University

  • White Papers // Feb 2010

    Transparency In Consumer Credit: The Usage Of The Apr

    The role of Annual Percentage Rate (APR) in installment plan selection was investigated. The choice of APR was motivated by its wide diffusion due to the mandatory disclosure acts. There have been doubts towards consumer understanding of APR. A sample of 299 consumers were given five series of credit alternatives....

    Provided By Roma Tre University

  • White Papers // Jan 2010

    A Fully Cognitive Approach for Future Internet

    This paper deals with an autonomous cognitive network management architecture which aims at achieving inter-network (horizontal) and inter-layer (vertical) cross-optimization. The proposed architecture is based on the so-called cognitive managers transparently embedded in properly selected network nodes. The core of each cognitive manager are the so-called thinking modules, which are...

    Provided By Roma Tre University

  • White Papers // Feb 2010

    Transparency In Consumer Credit: The Usage Of The Apr

    The role of Annual Percentage Rate (APR) in installment plan selection was investigated. The choice of APR was motivated by its wide diffusion due to the mandatory disclosure acts. There have been doubts towards consumer understanding of APR. A sample of 299 consumers were given five series of credit alternatives....

    Provided By Roma Tre University

  • White Papers // Jan 2010

    A Fully Cognitive Approach for Future Internet

    This paper deals with an autonomous cognitive network management architecture which aims at achieving inter-network (horizontal) and inter-layer (vertical) cross-optimization. The proposed architecture is based on the so-called cognitive managers transparently embedded in properly selected network nodes. The core of each cognitive manager are the so-called thinking modules, which are...

    Provided By Roma Tre University

  • White Papers // Mar 2010

    Dynamic QoS Evaluation of Multimedia Contents in Wireless Networks by "Double-Boomerang" Watermarking

    This paper presents a cooperative network-aware processing of multimedia content for dynamic quality of service management in wireless IP networks. The technique can be also used for quality control in UMTS environments, exploiting the tracing watermarking recently introduced in literature. In this paper, the authors use the transmitted video-sequences to...

    Provided By Roma Tre University

  • White Papers // Feb 2010

    Hierarchies of Keys in Secure Multicast Communications

    This paper considers the key management for secure multicast in the Logical Key Hierarchy (LKH) model and proposes a methodology to establish the minimal key bit length that guarantees a specified degree of confidentiality for the multicast communications managed within this model. The authors also introduce the concepts of information...

    Provided By Roma Tre University

  • White Papers // Jan 2012

    iBGP Deceptions: More Sessions, Fewer Routes

    Internal BGP (iBGP) is used to distribute inter-domain routes within a single ISP. The interaction between iBGP and the underlying IGP can lead to routing and forwarding anomalies. For this reason, several research contributions aimed at defining sufficient conditions to guarantee anomaly-free configurations and providing design guidelines for network operators....

    Provided By Roma Tre University