Sciweavers

1102 search results - page 123 / 221
» Interference and Communications among Active Network Applica...
Sort
View
121
Voted
IWDC
2005
Springer
117views Communications» more  IWDC 2005»
15 years 6 months ago
Oasis: A Hierarchical EMST Based P2P Network
Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems and ...
Pankaj Ghanshani, Tarun Bansal
92
Voted
ICC
2009
IEEE
162views Communications» more  ICC 2009»
15 years 7 months ago
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding
—The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security con...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
116
Voted
TASE
2007
IEEE
15 years 7 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...
81
Voted
JSAC
2006
108views more  JSAC 2006»
15 years 20 days ago
Distributed Nonlinear Integer Optimization for Data-Optical Internetworking
Abstract--We present a novel approach for joint optical network provisioning and Internet protocol (IP) traffic engineering, in which the IP and optical networks collaboratively op...
Anwar Elwalid, Debasis Mitra, Qiong Wang
103
Voted
CONEXT
2006
ACM
15 years 6 months ago
Shortcuts in a virtual world
We consider the case of a virtual world of peers that are organized in an overlay built by Delaunay Triangulation. Application layer routing is used to determine the path taken in...
Moritz Steiner, Ernst W. Biersack