Sciweavers

636 search results - page 117 / 128
» Computer Networking and Internet Protocols: A Comprehensive ...
Sort
View
LCN
2005
IEEE
15 years 3 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed
ICNP
2003
IEEE
15 years 3 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
LCN
2003
IEEE
15 years 3 months ago
PURPLE: Predictive Active Queue Management Utilizing Congestion Information
Active Queue Management (AQM) is an attempt to find a delicate balance between two antagonistic Internet queuing requirements: First, buffer space should be maximized to accommod...
Roman Pletka, Marcel Waldvogel, Soenke Mannal
WMASH
2003
ACM
15 years 3 months ago
End-to-end throughput and delay assurances in multihop wireless hotspots
Next generation Wireless Local Area Networks (WLAN’s) are likely to require multihop wireless connections between mobile nodes and Internet gateways to achieve high data rates f...
Kuang-Ching Wang, Parameswaran Ramanathan
HOTNETS
2010
14 years 4 months ago
A case for information-bound referencing
Links and content references form the foundation of the way that users interact today. Unfortunately, the links used today (URLs) are fragile since they tightly specify a protocol...
Ashok Anand, Aditya Akella, Vyas Sekar, Srinivasan...