Sciweavers

290 search results - page 36 / 58
» A Scalable, Ordered Scenario-Based Network Security Simulato...
Sort
View
ICC
2007
IEEE
106views Communications» more  ICC 2007»
15 years 6 months ago
A Distributed Approach to End-to-End Network Topology Inference
Abstract— To construct an efficient overlay network, the information of underlay is important. However, the inference of an underlay topology is not easy. We consider using end-...
Xing Jin, Qiuyan Xia, Shueng-Han Gary Chan
TON
2008
135views more  TON 2008»
14 years 11 months ago
Measurement-based admission control at edge routers
Abstract-- It is very important to allocate and manage resources for multimedia traffic flows with real-time performance requirements in order to guarantee quality-of-service (QoS)...
Seung Yeob Nam, Sunggon Kim, Dan Keun Sung
SASN
2006
ACM
15 years 5 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
IPOM
2009
Springer
15 years 6 months ago
A Feasibility Evaluation on Name-Based Routing
Abstract. The IPv4 addressing scheme has been the standard for Internet communication since it was established in the 1960s. However, the enormous increase in Internet traffic usag...
Haesung Hwang, Shingo Ata, Masayuki Murata
CONEXT
2007
ACM
15 years 3 months ago
On the cost of caching locator/ID mappings
Very recent activities in the IETF and in the Routing Research Group (RRG) of the IRTG focus on defining a new Internet architecture, in order to solve scalability issues related ...
Luigi Iannone, Olivier Bonaventure