Fault-tolerance and lookup consistency are considered crucial properties for building applications on top of structured overlay networks. Many of these networks use the ring topol...
The paper presents a novel protection methodology for setting protected paths in a multiservice GMPLSbased network scenario. By applying the proposed methods, label switched paths...
This paper introduces a Self-Similarity Matrix (SSM) based video copy detection scheme and a Visual Character-String (VCS) descriptor for SSM matching. SSM, which exploits the spa...
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
: Fault management in high performance cluster networks has been focused on the notion of hard faults (i.e., link or node failures). Network degradations that negatively impact per...
Jeffrey J. Evans, Seongbok Baik, Cynthia S. Hood, ...