Sciweavers

39 search results - page 1 / 8
» On predictive routing of security contexts in an all-IP netw...
Sort
View
CSCW
2012
ACM
12 years 8 days ago
Recommending routes in the context of bicycling: algorithms, evaluation, and the value of personalization
Users have come to rely on automated route finding services for driving, public transit, walking, and bicycling. Current state of the art route finding algorithms typically rely...
Reid Priedhorsky, David Pitchford, Shilad Sen, Lor...
PADS
2009
ACM
13 years 11 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu
INFOCOM
2002
IEEE
13 years 9 months ago
SAVE: Source Address Validity Enforcement Protocol
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...
WOWMOM
2006
ACM
137views Multimedia» more  WOWMOM 2006»
13 years 10 months ago
Evaluating Context Information Predictability for Autonomic Communication
Delay tolerant and mobile ad hoc networks, present considerable challenges to the development of protocols and systems. In particular, the challenge of being able to cope with the...
Mirco Musolesi, Cecilia Mascolo