Sciweavers

5079 search results - page 931 / 1016
» Hidden-Action in Network Routing
Sort
View
GLOBECOM
2006
IEEE
15 years 4 months ago
AS Path Inference by Exploiting Known AS Paths
Abstract— Inferring AS-level end-to-end paths can be a valuable tool for both network operators and researchers. A widely known technique for inferring end-to-end paths is to per...
Jian Qiu, Lixin Gao
3DGIS
2006
Springer
15 years 3 months ago
3D Navigation for 3D-GIS - Initial Requirements
The needs for three-dimensional (3D) visualization and navigation within 3D-GIS environment are growing and expanding rapidly in a variety of fields. In a steady shift from tradit...
Ivin Amri Musliman, Alias Abdul-Rahman, Volker Coo...
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
15 years 3 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
LOCA
2005
Springer
15 years 3 months ago
The COMPASS Location System
The aim of COMPASS (short for COM mon Positioning Architecture for Several Sensors) is to realize a location infrastructure which can make use of a multitude of different sensors,...
Frank Kargl, Alexander Bernauer
INFOCOM
2003
IEEE
15 years 3 months ago
Algorithms for Computing QoS Paths with Restoration
— There is a growing interest among service providers to offer new services with Quality of Service (QoS) guaranties that are also resilient to failures. Supporting QoS connectio...
Yigal Bejerano, Yuri Breitbart, Rajeev Rastogi, Al...