Sciweavers

5079 search results - page 91 / 1016
» Hidden-Action in Network Routing
Sort
View
IPTPS
2004
Springer
15 years 3 months ago
DHT Routing Using Social Links
— The equality and anonymity of peer-to-peer networks makes them vulnerable to routing denial of service attacks from misbehaving nodes. In this paper, we investigate how existin...
Sergio Marti, Prasanna Ganesan, Hector Garcia-Moli...
INFOCOM
2010
IEEE
14 years 8 months ago
On the Aggregatability of Router Forwarding Tables
—The rapid growth of global routing tables has raised concerns among many Internet Service Providers. The most immediate concern regarding routing scalability is the size of the ...
Xin Zhao, Yaoqing Liu, Lan Wang, Beichuan Zhang
ICC
2007
IEEE
171views Communications» more  ICC 2007»
15 years 4 months ago
Progressive Route Calculation Protocol for Wireless Mesh Networks
—Although network-wide flooding in reactive routing protocols like AODV [1] facilitates the discovery of optimal routes, they engender large control overhead. Some efficient floo...
Xuhui Hu, Myung J. Lee, Tarek N. Saadawi
GLOBECOM
2008
IEEE
15 years 4 months ago
Link Rate Allocation under Bandwidth and Energy Constraints in Sensor Networks
—In sensor networks, both energy and bandwidth are scarce resources. In the past, many energy efficient routing algorithms have been devised in order to maximize network lifetim...
Maggie X. Cheng, Xuan Gong, Lin Cai
GLOBECOM
2010
IEEE
14 years 8 months ago
Network Tomography via Compressed Sensing
In network tomography, we seek to infer link status parameters (such as delay) inside a network through end-toend probe sending between (external) boundary nodes. The main challeng...
Mohammad Hamed Firooz, Sumit Roy