Sciweavers

35 search results - page 7 / 7
» Loss Strategies for Competing TCP IP Connections
Sort
View
JSAC
2008
116views more  JSAC 2008»
13 years 5 months ago
Stability and Efficiency of Unstructured File Sharing Networks
We propose two unstructured file sharing games, unilateral and bilateral unstructured file sharing games, to study the interaction among self-interested players (users) of unstruct...
Honggang Zhang, Giovanni Neglia, Donald F. Towsley...
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 2 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
ICC
2007
IEEE
116views Communications» more  ICC 2007»
13 years 11 months ago
Fast Handover Scheme for Real-Time Applications in Mobile WiMAX
—Mobile WiMAX is one of the most promising technologies for broadband wireless communication. The IEEE 802.16e standard for Mobile WiMAX, the enhanced version of the IEEE 802.16 ...
Wenhua Jiao, Pin Jiang, Yuanyuan Ma
USS
2008
13 years 7 months ago
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks
Large-scale bandwidth-based distributed denial-of-service (DDoS) attacks can quickly knock out substantial parts of a network before reactive defenses can respond. Even traffic flo...
Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oli...
WWIC
2010
Springer
202views Communications» more  WWIC 2010»
13 years 9 months ago
SHORT: A Static-Hybrid Approach for Routing Real Time Applications over Multichannel, Multihop Wireless Networks
Many of the existing multichannel wireless network implementations rely on channel switching capability of the wireless radios to ensure network connectivity. However, due to both ...
Vijay Raman, Nitin H. Vaidya