Sciweavers

5079 search results - page 224 / 1016
» Hidden-Action in Network Routing
Sort
View
IJNSEC
2006
56views more  IJNSEC 2006»
14 years 11 months ago
Traffic Filtering and Routing in Partially-Hidden Networks
Suppose that an organization O wants to do the following: to reveal only part of its network map; to filter unwanted traffic passing through its network; and to route, to the righ...
Deholo Nali, Ali Miri, Carlisle M. Adams
AINA
2008
IEEE
15 years 5 months ago
Intra Domain Route Optimization for Ubiquitous
The main advantage of a wireless network is user mobility, which calls for efficient routing support at the network layer. An architecture combines hierarchical mobile IPv6 and ne...
Hye-Young Kim, Young-Sik Jeong, Laurence Tianruo Y...
AINTEC
2006
Springer
15 years 2 months ago
Proactive Resilience to Dropping Nodes in Mobile Ad Hoc Networks
Abstract. Proactive routing protocols for mobile ad hoc networks currently offer few mechanisms to detect and/or counter malevolent nodes. Stability and performance of most, if not...
Ignacy Gawedzki, Khaldoun Al Agha
SYRCODIS
2008
104views Database» more  SYRCODIS 2008»
15 years 12 days ago
Search Request Routing in Bittorrent and other P2P based File Sharing Networks
Existing p2p file sharing networks doesn't always give their users abilities to make an effective and fast searches for particular data. In this paper we introduce some impro...
Konstantin Scherbakov
CIKM
2009
Springer
15 years 2 months ago
Multidimensional routing indices for efficient distributed query processing
Traditional routing indices in peer-to-peer (P2P) networks are mainly designed for document retrieval applications and maintain aggregated one-dimensional values representing the ...
Christos Doulkeridis, Akrivi Vlachou, Kjetil N&osl...