Sciweavers

6110 search results - page 161 / 1222
» Graceful Network Operations
Sort
View
86
Voted
IPL
2008
72views more  IPL 2008»
15 years 25 days ago
Reducing communication costs in robust peer-to-peer networks
Several recent research results describe how to design Distributed Hash Tables (DHTs) that are robust to adversarial attack via Byzantine faults. Unfortunately, all of these resul...
Jared Saia, Maxwell Young
117
Voted
CONEXT
2007
ACM
15 years 2 months ago
An AS-level IP traceback system
Distributed Denial of Service (DDoS) attacks represent a serious threat to the appropriate operation of Internet services. To deal with this threat, we propose an IP traceback sys...
André O. Castelucio, Ronaldo M. Salles, Art...
COMCOM
2002
185views more  COMCOM 2002»
15 years 19 days ago
Infrastructure-based routing in wireless mobile ad hoc networks
In this paper, we propose a new protocol for wireless mobile ad hoc communications, which establishes a dynamic wireless mobile infrastructure to mimic and maintain the operation ...
Ahmed M. Safwat, Hossam S. Hassanein
101
Voted
HPCA
2007
IEEE
16 years 1 months ago
Concurrent Direct Network Access for Virtual Machine Monitors
This paper presents hardware and software mechanisms to enable concurrent direct network access (CDNA) by operating systems running within a virtual machine monitor. In a conventi...
Jeffrey Shafer, David Carr, Aravind Menon, Scott R...
169
Voted
IFIP
2009
Springer
15 years 7 months ago
Network Awareness in P2P-TV Applications
The increasing popularity of applications for video-streaming based on P2P paradigm (P2P-TV) is raising the interest of both broadcasters and network operators. The former see a pr...
Stefano Traverso, Emilio Leonardi, Marco Mellia, M...