Sciweavers

NETWORKING
2008
13 years 6 months ago
The Effect of Peer Selection with Hopcount or Delay Constraint on Peer-to-Peer Networking
We revisit the peer selection problem of finding the most nearby peer from an initiating node. The metrics to assess the closeness between peers are hopcount and delay, respectivel...
Siyu Tang, Huijuan Wang, Piet Van Mieghem
NETWORKING
2008
13 years 6 months ago
Cache Placement Optimization in Hierarchical Networks: Analysis and Performance Evaluation
Caching popular content in the Internet has been recognized as one of the effective solution to alleviate network congestion and accelerate user information access. Sharing and coo...
Wenzhong Li, Edward Chan, Yilin Wang, Daoxu Chen, ...
NETWORKING
2008
13 years 6 months ago
On the Social Cost of Distributed Selfish Content Replication
We study distributed content replication networks formed voluntarily by selfish autonomous users, seeking access to information objects that originate from distant servers. Each us...
Gerasimos G. Pollatos, Orestis Telelis, Vassilis Z...
NETWORKING
2008
13 years 6 months ago
XIAN Automated Management and Nano-Protocol to Design Cross-Layer Metrics for Ad Hoc Networking
In the highly dynamic and unpredictable environment of MANETs, cross-layer design is receiving growing interest but lacks experimental validation tools. This paper presents XIAN (C...
Hervé Aïache, Vania Conan, Laure Lebru...
NETWORKING
2008
13 years 6 months ago
Evolutionary Power Control Games in Wireless Networks
In this paper, we apply evolutionary games to non-cooperative power control in wireless networks. Specifically, we focus our study in a power control in W-CDMA and WIMAX wireless s...
Eitan Altman, Rachid El Azouzi, Yezekael Hayel, Ha...
NETWORKING
2008
13 years 6 months ago
The CPBT: A Method for Searching the Prefixes Using Coded Prefixes in B-Tree
Due to the increasing size of IP routing table and the growing rate of their lookups, many algorithms are introduced to achieve the required speed in table search and update or opt...
Mohammad Behdadfar, Hossein Saidi
NETWORKING
2008
13 years 6 months ago
On the Applicability of Knowledge Based NAT-Traversal for Home Networks
The presence of Network Address Translation (NAT) is a hindrance when accessing services within home networks, because NAT breaks the end-to-end connectivity model of the Internet ...
Andreas Müller, Andreas Klenk, Georg Carle
NETWORKING
2008
13 years 6 months ago
E2E Blocking Probability of IPTV and P2PTV
Increased Internet speeds together with new possibilities for tailor-made television services have spurred the interest in providing television via the Internet. Several television...
Yue Lu, Fernando A. Kuipers, Milena Janic, Piet Va...
NETWORKING
2008
13 years 6 months ago
DBR: Depth-Based Routing for Underwater Sensor Networks
Abstract. Providing scalable and efficient routing services in underwater sensor networks (UWSNs) is very challenging due to the unique characteristics of UWSNs. Firstly, UWSNs oft...
Hai Yan, Zhijie Jerry Shi, Jun-Hong Cui
NETWORKING
2008
13 years 6 months ago
Network Performance Assessment Using Adaptive Traffic Sampling
Multimedia and real-time services are spreading all over the Internet. The delivery quality of such contents is closely related to its network performance, for example in terms suc...
René Serral-Gracià, Albert Cabellos-...