Sciweavers

900 search results - page 155 / 180
» Controlling Inbound Traffic
Sort
View
133
Voted
CONEXT
2007
ACM
15 years 5 months ago
Near-optimal co-ordinated coding in wireless multihop networks
The recent work on COPE by Katti et al. demonstrates a practical application of network coding to wireless multihop networks. We note, however, that the opportunistic nature of CO...
Björn Scheuermann, Wenjun Hu, Jon Crowcroft
GLOBECOM
2009
IEEE
15 years 5 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
109
Voted
AINA
2004
IEEE
15 years 5 months ago
Authenticated Autonomous System Traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet making the defense against Distributed Denial of Service attacks one of the ha...
Vamsi Paruchuri, Arjan Durresi, Rajgopal Kannan, S...
ANTSW
2006
Springer
15 years 5 months ago
An Energy-Efficient Ant-Based Routing Algorithm for Wireless Sensor Networks
Abstract. Wireless Sensor Networks are characterized by having specific requirements such as limited energy availability, low memory and reduced processing power. On the other hand...
Tiago Camilo, Carlos Carreto, Jorge Sá Silv...
APNOMS
2006
Springer
15 years 5 months ago
GMPLS-Based VPN Service to Realize End-to-End QoS and Resilient Paths
We propose hierarchically distributed path computation elements (HDPCEs) that manage a multilayered GMPLS network and provide traffic engineering paths for end-to-end routes. We ap...
Hiroshi Matsuura, Kazumasa Takami