Sciweavers

CN
2007
95views more  CN 2007»
13 years 4 months ago
Sampling large Internet topologies for simulation purposes
In this paper, we develop methods to ‘‘sample’’ a small realistic graph from a large Internet topology. Despite recent activity, modeling and generation of realistic graph...
Vaishnavi Krishnamurthy, Michalis Faloutsos, Marek...
CN
2007
88views more  CN 2007»
13 years 4 months ago
Channel sharing by multi-class rate adaptive streams: Performance region and optimization
We consider the problem of channel sharing by rate adaptive streams belonging to various classes. The performance measure per class is the average scaled bandwidth allocated to co...
Nikos Argiriou, Leonidas Georgiadis
CN
2007
100views more  CN 2007»
13 years 4 months ago
Overlay architectures for file distribution: Fundamental performance analysis for homogeneous and heterogeneous cases
Peer-to-peer networks have been commonly used for tasks such as file sharing or file distribution. We study a class of cooperative file distribution systems where a file is br...
Ernst W. Biersack, Damiano Carra, Renato Lo Cigno,...
CN
2007
141views more  CN 2007»
13 years 4 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...
CN
2007
179views more  CN 2007»
13 years 4 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
CN
2007
91views more  CN 2007»
13 years 4 months ago
A distributed architecture for scalable private RFID tag identification
Agusti Solanas, Josep Domingo-Ferrer, Antoni Mart&...
CN
2007
137views more  CN 2007»
13 years 4 months ago
A survey on ultra wide band medium access control schemes
Ultra wideband (UWB) technology based primarily on the impulse radio paradigm has a huge potential for revolutionizing the world of digital communications especially wireless comm...
Ashima Gupta, Prasant Mohapatra
CN
2007
104views more  CN 2007»
13 years 4 months ago
Performance analysis of the AntNet algorithm
A number of routing algorithms based on the ant-colony metaphor have been proposed for communication networks. However, there has been little work on the performance analysis of a...
S. S. Dhillon, Piet Van Mieghem
CN
2007
115views more  CN 2007»
13 years 4 months ago
Cost-effective single-hub WDM ring networks: A proposal and analysis
In this paper, we study a new concept of traffic grooming in wavelength-division multiplexing (WDM) ring networks that aims at eliminating both the bandwidth underutilization and ...
Nizar Bouabdallah, Harry G. Perros