Sciweavers

LCN
2008
IEEE
13 years 11 months ago
Managing energy use in a network with a new SNMP Power State MIB
— Energy consumption has become a major factor in the total cost of ownership (TCO) of IT equipment. The power state of IT equipment is effectively “invisible” to the network...
Francisco Blanquicet, Kenneth J. Christensen
LCN
2008
IEEE
13 years 11 months ago
An experimental analysis of Zigbee networks
— Zigbee has been touted as a technology that can be embedded in a wide range of products and applications across consumer, commercial, industrial and government markets. However...
E. Dalila Pinedo-Frausto, J. Antonio García...
LCN
2008
IEEE
13 years 11 months ago
On measuring available bandwidth in wireless networks
Abstract— BART is a state-of-the-art active end-to-end bandwidth measurement method that estimates not only the available bandwidth but also the link capacity of the bottleneck l...
Andreas Johnsson, Mats Björkman
LCN
2008
IEEE
13 years 11 months ago
P2P directory search: Signature Array Hash Table
— Bloom filters are a well known data structure for approximate set membership. Bloom filters are space efficient but require many independent hashes and consecutive memory acces...
Miguel Jimeno, Kenneth J. Christensen
LCN
2008
IEEE
13 years 11 months ago
IPclip: An architecture to restore Trust-by-Wire in packet-switched networks
—During the last decades, the Internet has steadily developed into a mass medium. The target group radically changed compared to, e.g., the 90s. Because virtually everyone has ac...
Harald Widiger, Stephan Kubisch, Peter Danielis, J...
LCN
2008
IEEE
13 years 11 months ago
Spatially Disjoint Multipath Routing protocol without location information
—Multipath routing permits the discovery and use of multiple paths between a source and a destination. We develop a distributed on-demand multipath routing protocol for MANETs ca...
Juan Jose Galvez, Pedro M. Ruiz, Antonio F. G&oacu...
LCN
2008
IEEE
13 years 11 months ago
Cooperative caching: The case for P2P traffic
Mohamed Hefeeda, Behrooz Noorizadeh
LCN
2008
IEEE
13 years 11 months ago
Covert channels in multiplayer first person shooter online games
Abstract—Covert channels aim to hide the existence of communication between two or more parties. Such channels typically utilise pre-existing (overt) data transmissions to carry ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
LCN
2008
IEEE
13 years 11 months ago
TCP mechanisms for improving the user experience for time-dependent thin-stream applications
—A wide range of Internet-based services that use reliable transport protocols display what we call thin-stream properties. This means that the application sends data with such a...
Andreas Petlund, Kristian Evensen, Carsten Griwodz...