Sciweavers

642 search results - page 85 / 129
» Detecting Spoofed Packets
Sort
View
CCR
2000
113views more  CCR 2000»
15 years 4 months ago
TCP rate control
TCP congestion control 9] is designed for network stability, robustness and opportunistic use of network bu er and bandwidth resources on an end-to-end per-connection basis. Upon ...
Shrikrishna Karandikar, Shivkumar Kalyanaraman, Pr...
WCNC
2010
IEEE
15 years 2 months ago
Physical Layer Network Coding with Multiple Antennas
: The two-phase MIMO NC (network coding) scheme can be used to boost the throughput in a two-way relay channel in which nodes are equipped with multiple antennas. The obvious strat...
Shengli Zhang, Soung Chang Liew
SOSP
2001
ACM
16 years 1 months ago
Resilient Overlay Networks
A Resilient Overlay Network (RON) is an architecture that allows distributed Internet applications to detect and recover from path outages and periods of degraded performance with...
David G. Andersen, Hari Balakrishnan, M. Frans Kaa...
INFOCOM
2005
IEEE
15 years 10 months ago
HADOF: defense against routing disruptions in mobile ad hoc networks
— HADOF is a set of mechanisms to defend against routing disruptions in mobile ad hoc networks. Based on the observed behavior and the history record of each node, HADOF aims to ...
Wei Yu, Yan Sun, K. J. Ray Liu
RAID
2004
Springer
15 years 10 months ago
On the Design and Use of Internet Sinks for Network Abuse Monitoring
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
Vinod Yegneswaran, Paul Barford, David Plonka