Sciweavers

CN
2011
139views more  CN 2011»
12 years 11 months ago
MultiCache: An overlay architecture for information-centric networking
—It has become apparent for quite some time that the Internet has evolved from a network connecting pairs of end-hosts to a substrate for information dissemination. While this sh...
Konstantinos V. Katsaros, George Xylomenos, George...
CN
2011
94views more  CN 2011»
12 years 11 months ago
A Dynamic Recursive Unified Internet Design (DRUID)
Joseph D. Touch, Ilia Baldine, Rudra Dutta, Gregor...
CN
2011
116views more  CN 2011»
12 years 11 months ago
WDA: A Web farm Distributed Denial Of Service attack attenuator
Distributed Denial Of Service (DDoS) attacks are familiar threats to Internet users for more than ten years. Such attacks are carried out by a “Bot net”, an army of zombie hos...
Ehud Doron, Avishai Wool
CN
2011
129views more  CN 2011»
12 years 11 months ago
Decapitation of networks with and without weights and direction: The economics of iterated attack and defense
Vulnerability of networks against one-shot decapitation attacks has been addressed several times in the literature. A first study on how a network can best defend itself by reple...
Josep Domingo-Ferrer, Úrsula Gonzále...
CN
2011
78views more  CN 2011»
12 years 11 months ago
Incentivizing the global wireless village
Gergely Biczók, László Toka, ...
CN
2011
65views more  CN 2011»
12 years 11 months ago
A holistic sensor network design for energy conservation and efficient data dissemination
Zehua Zhou, Xiaojing Xiang, Xin Wang, Jianping Pan
CN
2011
81views more  CN 2011»
12 years 11 months ago
Dynamic system model for optimal configuration of mobile RFID systems
Juan J. Alcaraz, Esteban Egea-López, Javier...
CN
2011
117views more  CN 2011»
12 years 11 months ago
Cross-layer design in multihop wireless networks
In this paper, we take a holistic approach to the protocol architecture design in multihop wireless networks. Our goal is to integrate various protocol layers into a rigorous fram...
Lijun Chen, Steven H. Low, John C. Doyle
CN
2011
127views more  CN 2011»
12 years 11 months ago
A game theoretic analysis of network design with socially-aware users
In many scenarios network design is not enforced by a central authority, but arises from the interactions of several self-interested agents. This is the case of the Internet, wher...
Jocelyne Elias, Fabio Martignon, Konstantin Avrach...
CN
2011
88views more  CN 2011»
12 years 11 months ago
Multi-hour network planning based on domination between sets of traffic matrices
—In multi-hour network design, periodic traffic variations along time are considered in the dimensioning process. Then, the non coincidence of traffic peaks along the day or the ...
Pablo Pavón-Mariño, Belen Garcia-Man...