Sciweavers

Share
GLOBECOM
2008
IEEE
9 years 6 months ago
Multi-Way Pipelining for Power-Efficient IP Lookup
Weirong Jiang, Viktor K. Prasanna
GLOBECOM
2008
IEEE
9 years 6 months ago
Inferring Internet Worm Temporal Characteristics
— Internet worm attacks pose a significant threat to network security. In this work, we coin the term Internet worm tomography as inferring the characteristics of Internet worms...
Qian Wang, Zesheng Chen, Kia Makki, Niki Pissinou,...
GLOBECOM
2008
IEEE
9 years 6 months ago
Impact of Mobility on the Behavior of Interference in Cellular Wireless Networks
In this study, the impact of mobility is investigated in low-speed environments such as femtocells and picocells for wireless networks. Given that there is interference on the upl...
Serhan Yarkan, Amine Maaref, Koon Hoo Teo, Hü...
GLOBECOM
2008
IEEE
9 years 6 months ago
Evaluating the Performance on ID/Loc Mapping
—Challenges of routing scalability has attracted many research efforts, represented by the works of splitting identifier and locator semantics of IP addresses. A group of identi...
Hong Zhang, Maoke Chen, Yuncheng Zhu
GLOBECOM
2008
IEEE
9 years 6 months ago
A Dynamic Binary Hash Scheme for IPv6 Lookup
Qiong Sun, Xiaohong Huang, Xiaoju Zhou, Yan Ma
GLOBECOM
2008
IEEE
9 years 6 months ago
Fast RTP Retransmission for IPTV - Implementation and Evaluation
—With the deployment of IPTV reliability for multicast is becoming an important research topic again. Even though it has been intensively investigated before, there is now an und...
M. J. Prins, Marcus Brunner, G. Karagiannis, Henri...
GLOBECOM
2008
IEEE
9 years 6 months ago
A Memory-Optimized Bloom Filter Using an Additional Hashing Function
— A Bloom filter is a simple space-efficient randomized data structure for the representation set of items in order to support membership queries. In recent years, Bloom filte...
Mahmood Ahmadi, Stephan Wong
GLOBECOM
2008
IEEE
9 years 6 months ago
Support Vector Machines and Random Forests Modeling for Spam Senders Behavior Analysis
— Unwanted and malicious messages dominate Email traffic and pose a great threat to the utility of email communications. Reputation systems have been getting momentum as the sol...
Yuchun Tang, Sven Krasser, Yuanchen He, Weilai Yan...
GLOBECOM
2008
IEEE
9 years 6 months ago
A Secure VANET MAC Protocol for DSRC Applications
— Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in activ...
Yi Qian, Kejie Lu, Nader Moayeri
GLOBECOM
2008
IEEE
9 years 6 months ago
PeerGraph: A Distributed Data Structure for Peer-to-Peer Streaming
Video streaming over peer-to-peer networks has received significant attention recently. Accordingly, much work is done on video streaming under the assumption that all the peers ...
Ali Saman Tosun, Turgay Korkmaz
books