Sciweavers

Share
NOMS
2008
IEEE
10 years 2 months ago
MANKOP: A Knowledge Plane for wireless ad hoc networks
— In mobile wireless ad hoc networks (MANETs), layering is frequently broken to cope with changes on the medium. Layering is also violated in order to implement autonomic behavio...
Daniel F. Macedo, Aldri L. dos Santos, Guy Pujolle...
NOMS
2008
IEEE
107views Communications» more  NOMS 2008»
10 years 2 months ago
A Framework for the establishment of inter-domain, on-demand VPNs
– Virtual Private Networks (VPNs) are a popular and cost-effective means to build wide-area corporate networks, since they provide bandwidth, privacy and security for a fraction ...
Alexandre Matos, Fernando Matos, Paulo Simõ...
NOMS
2008
IEEE
10 years 2 months ago
A novel approach to bottleneck analysis in networks
—In this paper∗ , we devise a novel method for bottleneck analysis of UDP networks based on the concept of network utility maximization. To determine the losses on the links in...
Nikhil Shetty, Assane Gueye, Jean C. Walrand
NOMS
2008
IEEE
10 years 2 months ago
Optimizing request denial and latency in an agent-based VPN architecture
—Agent-based virtual private networks architecture (ABVA) refers to the environment where a third-party provider runs and administers remote access VPN service for organizations ...
Haiyang Qian, Steve Dispensa, Deep Medhi
NOMS
2008
IEEE
108views Communications» more  NOMS 2008»
10 years 2 months ago
Autonomic QoS optimization of real-time internet audio using loss prediction and stochastic control
— Quality of Internet audio is highly sensitive to packet loss caused by congestion in the links. Packet loss for audio is normally rectified by adding redundancy using Forward ...
Lopa Roychoudhuri, Ehab S. Al-Shaer
NOMS
2008
IEEE
10 years 2 months ago
Tracking back the root cause of a path change in interdomain routing
—Interdomain routes change over time, and it is impressive to observe up to which extent. Routes may change many times in the same day and sometimes in the same hour or minute. S...
Alessio Campisano, Luca Cittadini, Giuseppe Di Bat...
NOMS
2008
IEEE
10 years 2 months ago
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks
Abstract—System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operati...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
NOMS
2008
IEEE
175views Communications» more  NOMS 2008»
10 years 2 months ago
Analysis of application performance and its change via representative application signatures
Abstract—Application servers are a core component of a multitier architecture that has become the industry standard for building scalable client-server applications. A client com...
Ningfang Mi, Ludmila Cherkasova, Kivanc M. Ozonat,...
NOMS
2008
IEEE
105views Communications» more  NOMS 2008»
10 years 2 months ago
Characterization of IP flows eligible for lambda-connections in optical networks
Abstract—The advance on data transmission in optical networks has allowed data forwarding decisions to be taken at multiple levels in the protocol stack (e.g., at network and opt...
Tiago Fioreze, Mattijs Oude Wolbers, Remco van de ...
NOMS
2008
IEEE
117views Communications» more  NOMS 2008»
10 years 2 months ago
Application of adaptive probing for fault diagnosis in computer networks
— This dissertation presents an adaptive probing based tool for fault diagnosis in computer networks by addressing the problems of probe station selection and probe selection. We...
Maitreya Natu, Adarshpal S. Sethi
books