Sciweavers

Share
CONEXT
2007
ACM
9 years 1 months ago
SWARM: self-organization of community wireless mesh networks
Saumitra M. Das, Konstantina Papagiannaki, Suman B...
CONEXT
2007
ACM
9 years 1 months ago
A next generation internet architecture for mobility and multi-homing support
The current internetworking architecture presents some limitations to naturally support mobility and multi-homing. Among the limitations, the IP semantic overload seems to be a pr...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...
CONEXT
2007
ACM
9 years 1 months ago
Extending web browsers architectures to support HTTP session mobility
In a bid to extend web browsers capabilities, a new extension that transfers HTTP session between two web browsers also knows as User Agents will be developed. The capabilities of...
Michael O. Adeyeye, Neco Ventura
CONEXT
2007
ACM
9 years 1 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek
CONEXT
2007
ACM
9 years 1 months ago
Multiplexing BGP sessions with BGP-Mux
Vytautas Valancius, Nick Feamster
CONEXT
2007
ACM
9 years 1 months ago
Towards a clustering based data diffusion protocol in delay tolerant networks
In Delay Tolerant Networks (DTN), diffusion protocols can benefit from the users’ mobility in order to reach some distant nodes. However, existing protocols like flooding pres...
Sana Tmar, Eric Fleury
CONEXT
2007
ACM
9 years 1 months ago
Promoting fluidity in the flow of packets of 802.11 wireless mesh networks
Wireless Mesh Networks (WMNs) are based on packet forwarding and therefore require efficient multi-hop protocols for their deployment. Toward this objective, we study the flow o...
Adel Aziz, Roger Karrer, Patrick Thiran
CONEXT
2007
ACM
9 years 1 months ago
Daily walks in Paris: a practical analysis of wi-fi access points
Guillaume Valadon, Florian Le Goff, Christophe Ber...
CONEXT
2007
ACM
9 years 1 months ago
An AS-level IP traceback system
Distributed Denial of Service (DDoS) attacks represent a serious threat to the appropriate operation of Internet services. To deal with this threat, we propose an IP traceback sys...
André O. Castelucio, Ronaldo M. Salles, Art...
books