Sciweavers

132 search results - page 20 / 27
» Impact of hot-potato routing changes in IP networks
Sort
View
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
14 years 7 months ago
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique
Spam is increasingly accepted as a problem associated with compromised hosts or email accounts. This problem not only makes the tracking of spam sources difficult but also enables ...
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fa...
IEEEARES
2006
IEEE
15 years 3 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman
JNW
2006
145views more  JNW 2006»
14 years 9 months ago
A Comparison of Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
Matthew Leslie, Jim Davies, Todd Huffman
ITICSE
2004
ACM
15 years 3 months ago
Teaching computer networking with the help of personal computer networks
This paper describes an “experiential” learning approach to teaching a foundational course on Computer Networking. In additional to the traditional laboratory sessions and ana...
Rocky K. C. Chang
NETWORKING
2010
14 years 11 months ago
Handling Transient Link Failures Using Alternate Next Hop Counters
In this paper, we propose a routing technique to alleviate packet loss due to transient link failures, which are major causes of disruption in the Internet. The proposed technique ...
Suksant Sae Lor, Raul Landa, Redouane Ali, Miguel ...