Sciweavers

1102 search results - page 171 / 221
» Interference and Communications among Active Network Applica...
Sort
View
SIGCOMM
2006
ACM
15 years 8 months ago
Enabling contribution awareness in an overlay broadcasting system
We consider the design of bandwidth-demanding broadcasting applications using overlays in environments characterized by hosts with limited and asymmetric bandwidth, and significa...
Yu-Wei Eric Sung, Michael A. Bishop, Sanjay G. Rao
IWCMC
2009
ACM
15 years 8 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
MMB
2010
Springer
194views Communications» more  MMB 2010»
15 years 6 months ago
Searching for Tight Performance Bounds in Feed-Forward Networks
Abstract. Computing tight performance bounds in feed-forward networks under general assumptions about arrival and server models has turned out to be a challenging problem. Recently...
Andreas Kiefer, Nicos Gollan, Jens B. Schmitt
TRIDENTCOM
2006
IEEE
15 years 8 months ago
CMT II: An agent based framework for comprehensive IP measurements
— The Communication Measurement Tool II (CMT II) is a framework for comprehensive IP measurements. It is the next development stage of the succeeded measurement framework called ...
Thomas Pfeiffenberger, Thomas Fichtel
VIZSEC
2004
Springer
15 years 7 months ago
PortVis: a tool for port-based detection of security events
Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coars...
Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, To...