Sciweavers

CONEXT
2007
ACM
13 years 8 months ago
Internet routing resilience to failures: analysis and implications
Internet interdomain routing is policy-driven, and thus physical connectivity does not imply reachability. On average, routing on today's Internet works quite well, ensuring ...
Jian Wu, Ying Zhang, Zhuoqing Morley Mao, Kang G. ...
CONEXT
2007
ACM
13 years 8 months ago
Internet economics: the use of Shapley value for ISP settlement
Within the current Internet, autonomous ISPs implement bilateral agreements, with each ISP establishing agreements that suit its own local objective to maximize its profit. Peerin...
Richard T. B. Ma, Dah-Ming Chiu, John C. S. Lui, V...
CONEXT
2007
ACM
13 years 8 months ago
Experimenting with real-life opportunistic communications using windows mobile devices
Pocket Switched Networks (PSN) is a novel communication paradigm which aims to exploit the opportunistic contacts between mobile devices to exchange data over multiple hops. A key...
Anna Kaisa Pietiläinen, Christophe Diot
CONEXT
2007
ACM
13 years 8 months ago
Multipath code casting for wireless mesh networks
Christos Gkantsidis, Wenjun Hu, Peter B. Key, Bozi...
CONEXT
2007
ACM
13 years 8 months ago
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates a route to an IP prefix it does not own, is becoming an increasingly serious security p...
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing M...
CONEXT
2007
ACM
13 years 8 months ago
Fair and efficient scheduling in data ferrying networks
Data-ferrying disconnection-tolerant networks allow remote rural areas to access the Internet at very low cost, making them viable alternatives to more expensive access technologi...
Shimin Guo, Srinivasan Keshav
CONEXT
2007
ACM
13 years 8 months ago
Backpressure multicast congestion control in mobile ad-hoc networks
In mobile ad-hoc networks, the multicast paradigm is of central importance. It can help to save scarce medium bandwidth if packets are to be delivered to multiple destinations. We...
Björn Scheuermann, Matthias Transier, Christi...
CONEXT
2007
ACM
13 years 8 months ago
Experience with an implementation of the Idle Sense wireless access method
Yan Grunenberger, Martin Heusse, Franck Rousseau, ...
CONEXT
2007
ACM
13 years 8 months ago
Identifying dynamic IP address blocks serendipitously through background scanning traffic
Today's Internet contains a large portion of "dynamic" IP addresses, which are assigned to clients upon request. A significant amount of malicious activities have b...
Yu Jin, Esam Sharafuddin, Zhi-Li Zhang