Sciweavers

Share
CONEXT
2008
ACM
9 years 8 months ago
A probabilistic model of k-coverage in minimum cost wireless sensor networks
One of the fundamental problems in the wireless sensor networks is the coverage problem. The coverage problem fundamentally address the quality of service (surveillance or monitor...
S. Ali Raza Zaidi, Maryam Hafeez, Desmond C. McLer...
CONEXT
2008
ACM
9 years 8 months ago
Distributed content delivery using load-aware network coordinates
To scale to millions of Internet users with good performance, content delivery networks (CDNs) must balance requests between content servers while assigning clients to nearby serv...
Nicholas Ball, Peter R. Pietzuch
CONEXT
2008
ACM
9 years 8 months ago
Packet-dropping adversary identification for data plane security
Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly el...
Xin Zhang, Abhishek Jain 0002, Adrian Perrig
CONEXT
2008
ACM
9 years 8 months ago
Advantages of a PCE-based control plane for LISP
The Locator/Identifier Separation Protocol (LISP) is one of the candidate solutions to address the scalability issues in inter-domain routing. The current proposals for its contro...
Alberto Castro, Martín Germán, Xavie...
CONEXT
2008
ACM
9 years 8 months ago
Observing slow crustal movement in residential user traffic
It is often argued that rapidly increasing video content along with the penetration of high-speed access is leading to explosive growth in the Internet traffic. Contrary to this p...
Kenjiro Cho, Kensuke Fukuda, Hiroshi Esaki, Akira ...
CONEXT
2008
ACM
9 years 8 months ago
A priority-layered approach to transport for high bandwidth-delay product networks
High-speed organizational networks running over leased fiber-optic lines or VPNs suffer from the well-known limitations of TCP over long-fat pipes. High-performance protocols like...
Vidhyashankar Venkataraman, Paul Francis, Murali S...
CONEXT
2008
ACM
9 years 8 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
CONEXT
2008
ACM
9 years 8 months ago
Inter-domain routing using topology information
Abstract - This paper proposes an architecture for interdomain routing, called DTIA
Pedro Amaral, Luis Bernardo, Paulo Pinto
CONEXT
2008
ACM
9 years 8 months ago
Capacity estimation of ADSL links
Daniele Croce, Taoufik En-Najjary, Guillaume Urvoy...
CONEXT
2008
ACM
9 years 8 months ago
Packet doppler: network monitoring using packet shift detection
Due to recent large-scale deployments of delay and losssensitive applications, there are increasingly stringent demands on the monitoring of service level agreement metrics. Altho...
Tongqing Qiu, Jian Ni, Hao Wang, Nan Hua, Yang Ric...
books