Sciweavers

CONEXT
2005
ACM
13 years 6 months ago
Bottleneck detection in UMTS via TCP passive monitoring: a real case
Fabio Ricciato, Francesco Vacirca, Martin Karner
CONEXT
2005
ACM
13 years 6 months ago
Stealth distributed hash table: unleashing the real potential of peer-to-peer
Andrew Brampton, Andrew MacQuire, Idris A. Rai, Ni...
CONEXT
2005
ACM
13 years 6 months ago
Location based placement of whole distributed systems
The high bandwidth and low latency of the modern internet has made possible the deployment of distributed computing platforms. The XenoServer platform provides a distributed compu...
David Spence, Jon Crowcroft, Steven Hand, Timothy ...
CONEXT
2005
ACM
13 years 6 months ago
Janus: an architecture for flexible access to sensor networks
We present the design and implementation of the Janus1 architecture for providing flexible and lightweight access to sensor network resources from Internet-type networks. Janus p...
Richard Gold
CONEXT
2005
ACM
13 years 6 months ago
TIE breaking: tunable interdomain egress selection
— The separation of intradomain and interdomain routing has been a key feature of the Internet’s routing architecture from the early days of the ARPAnet. However, the appropria...
Renata Teixeira, Timothy G. Griffin, Mauricio G. C...
CONEXT
2005
ACM
13 years 6 months ago
The consistent web: a vision for the future
Ciaran Ferry, Stephen Blott
CONEXT
2005
ACM
13 years 6 months ago
Hybrid reliable multicast with TCP-XM
In recent years, much work has been done on attempting to scale multicast data transmission to hundreds or thousands of receivers. There are, however, many situations where an app...
Karl Jeacle, Jon Crowcroft, Marinho P. Barcellos, ...
CONEXT
2005
ACM
13 years 6 months ago
Optimal positioning of active and passive monitoring devices
Network measurement is essential for assessing performance issues, identifying and locating problems. Two common strategies are the passive approach that attaches specific device...
Claude Chaudet, Eric Fleury, Isabelle Guéri...
CONEXT
2005
ACM
13 years 6 months ago
Path key establishment using multiple secured paths in wireless sensor networks
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy limits of individual sensor in wireless sensor networks. In this scheme, a ring...
Guanfeng Li, Hui Ling, Taieb Znati