Sciweavers

5079 search results - page 107 / 1016
» Hidden-Action in Network Routing
Sort
View
DEBS
2003
ACM
15 years 3 months ago
Peer-to-peer overlay broker networks in an event-based middleware
Overlay broker networks are an important part of an eventbased middleware. In this paper, we investigate the requirements of overlay broker networks and argue that using peer-to-p...
Peter R. Pietzuch, Jean Bacon
ANSS
2007
IEEE
15 years 4 months ago
The Impact of the Mobility Model on Delay Tolerant Networking Performance Analysis
— Delay tolerant networks (DTNs) are a class of networks that experience frequent and long-duration partitions due to sparse distribution of nodes. The topological impairments ex...
Muhammad Abdulla, Robert Simon
JACM
2002
163views more  JACM 2002»
14 years 9 months ago
Formal verification of standards for distance vector routing protocols
We show how to use an interactive theorem prover, HOL, together with a model checker, SPIN, to prove key properties of distance vector routing protocols. We do three case studies: ...
Karthikeyan Bhargavan, Davor Obradovic, Carl A. Gu...
SIGCOMM
2012
ACM
13 years 12 days ago
LIFEGUARD: practical repair of persistent route failures
The Internet was designed to always find a route if there is a policycompliant path. However, in many cases, connectivity is disrupted despite the existence of an underlying vali...
Ethan Katz-Bassett, Colin Scott, David R. Choffnes...
CSFW
2012
IEEE
13 years 11 days ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...