Sciweavers

5079 search results - page 100 / 1016
» Hidden-Action in Network Routing
Sort
View
GLOBECOM
2008
IEEE
15 years 4 months ago
An Upper Bound on Network Size in Mobile Ad-Hoc Networks
—In this paper we propose a model to compute an upper bound for the maximum network size in mobile ad-hoc networks. Our model is based on the foundation that for a unicast route ...
Michael Pascoe, Javier Gomez, Victor Rangel, Migue...
SENSYS
2003
ACM
15 years 3 months ago
On the effect of localization errors on geographic face routing in sensor networks
In the absence of location errors, geographic routing - using a combination of greedy forwarding and face routing - has been shown to work correctly and efficiently. The effects o...
Karim Seada, Ahmed Helmy, Ramesh Govindan
NETWORKING
2004
14 years 11 months ago
A New Method of Primary Routes Selection for Local Restoration
We consider the problem of non-bifurcated multicommodity flows rerouting in survivable connection-oriented networks. We focus on local restoration, in which the backup route is rer...
Krzysztof Walkowiak
ICUMT
2009
14 years 7 months ago
Towards real implementations of dynamic robust routing exploiting path diversity
In this paper we compare the performance of tree different dynamic traffic engineering algorithms exploiting path diversity in the Internet, TEXCP, TRUMP and MIRTO. We passed throu...
Luca Muscariello, Diego Perino, Bruno Nardelli
SIGCOMM
2012
ACM
13 years 11 days ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...