Sciweavers

5079 search results - page 152 / 1016
» Hidden-Action in Network Routing
Sort
View
IWAN
2000
Springer
15 years 1 months ago
An Architecture for Application Layer Routing
Atanu Ghosh, Michael Fry, Jon Crowcroft
CNSR
2007
IEEE
158views Communications» more  CNSR 2007»
14 years 12 months ago
Bounding the Information Collection Performance of Wireless Sensor Network Routing
Wireless sensor networks have mainly been designed for information-collecting purposes, such as habitat monitoring, product process tracing, battlefield surveillance, etc. In orde...
Qinghua Wang, Tingting Zhang, Stefan Pettersson
120
Voted
FORTE
2011
14 years 1 months ago
Analyzing BGP Instances in Maude
Analyzing Border Gateway Protocol (BGP) instances is a crucial step in the design and implementation of safe BGP systems. Today, the analysis is a manual and tedious process. Resea...
Anduo Wang, Carolyn L. Talcott, Limin Jia, Boon Th...
PAM
2011
Springer
14 years 29 days ago
On the Feasibility of Bandwidth Detouring
Internet applications that route data over default Internet paths can often increase performance by sending their traffic over alternative “detour” paths. Previous work has sho...
Thom Haddow, Sing Wang Ho, Jonathan Ledlie, Cristi...