Sciweavers

INFOCOM
2006
IEEE
13 years 10 months ago
Scheduling in Non-Blocking Buffered Three-Stage Switching Fabrics
— Three-stage non-blocking switching fabrics are the next step in scaling current crossbar switches to many hundreds or few thousands of ports. Congestion (output contention) man...
Nikolaos Chrysos, Manolis Katevenis
INFOCOM
2006
IEEE
13 years 10 months ago
Optimal Scheduling Algorithms for Input-Queued Switches
— The input-queued switch architecture is widely used in Internet routers, due to its ability to run at very high line speeds. A central problem in designing an input-queued swit...
Devavrat Shah, Damon Wischik
INFOCOM
2006
IEEE
13 years 10 months ago
Research on Optical Core Networks in the e-Photon/ONe Network of Excellence
Franco Callegati, Javier Aracil, Lena Wosinska, Ni...
INFOCOM
2006
IEEE
13 years 10 months ago
Multistage Constructions of Linear Compressors, Non-Overtaking Delay Lines, and Flexible Delay Lines
— Queueing theory is generally known as the theory to study the performance of queues. In this paper, we are interested in another aspect of queueing theory, the theory to constr...
Cheng-Shang Chang, Yi-Ting Chen, Jay Cheng, Duan-S...
INFOCOM
2006
IEEE
13 years 10 months ago
Nomadic Service Points
— We consider the novel problem of dynamically assigning application sessions of mobile users or user groups to service points. Such assignments must balance the tradeoff between...
Edward Bortnikov, Israel Cidon, Idit Keidar
INFOCOM
2006
IEEE
13 years 10 months ago
A Comparative Study of the DNS Design with DHT-Based Alternatives
— The current Domain Name System (DNS) follows a hierarchical tree structure. Several recent efforts proposed to re-implement DNS as a peer-to-peer network with a flat structure...
Vasileios Pappas, Daniel Massey, Andreas Terzis, L...
INFOCOM
2006
IEEE
13 years 10 months ago
Session Privacy Enhancement by Traffic Dispersion
— Traditional network routing uses the single (shortest) path paradigm. This paradigm leaves the session vulnerable to a variety of security threats, such as eavesdropping. We pr...
Haim Zlatokrilov, Hanoch Levy
INFOCOM
2006
IEEE
13 years 10 months ago
Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications
Abstract— Network utility maximization (NUM) problems provide an important approach to conduct network resource management such as end-to-end rate allocation. In the existing lit...
Daniel Pérez Palomar, Mung Chiang