Sciweavers

5079 search results - page 13 / 1016
» Hidden-Action in Network Routing
Sort
View
EJWCN
2010
119views more  EJWCN 2010»
14 years 4 months ago
Simulations of the Impact of Controlled Mobility for Routing Protocols
This paper addresses mobility control routing in wireless networks. Given a data flow request between a sourcedestination pair, the problem is to move nodes towards the best placem...
Valeria Loscrì, Enrico Natalizio, Carmelo C...
91
Voted
SIGCOMM
2012
ACM
13 years 3 days ago
Fs-PGBR: a scalable and delay sensitive cloud routing protocol
This paper proposes an improved version of a fully distributed routing protocol, that is applicable for cloud computing infrastructure. Simulation results shows the protocol is id...
Julien Mineraud, Sasitharan Balasubramaniam, Jussi...
70
Voted
ICUMT
2009
14 years 7 months ago
Coordinate-based routing: Refining nodeIds in structured peer-to-peer systems
Structured peer-to-peer systems--also known as key-based routing protocols--offer a base for a broad range of applications. In the past, different topology adaptation mechanisms fo...
Fabian Hartmann, Bernhard Heep
CONEXT
2010
ACM
14 years 7 months ago
Scalable routing on flat names
We introduce a protocol which routes on flat, locationindependent identifiers with guaranteed scalability and low stretch. Our design builds on theoretical advances in the area of...
Ankit Singla, Brighten Godfrey, Kevin R. Fall, Gia...
ICASSP
2011
IEEE
14 years 1 months ago
On the success of network inference using a markov routing model
In this paper we discuss why a simple network topology inference algorithm based on network co-occurrence measurements and a Markov random walk model for routing enables perfect t...
Laura Balzano, Robert Nowak, Matthew Roughan