Sciweavers

894 search results - page 152 / 179
» Internet Routing
Sort
View
103
Voted
ICNP
2007
IEEE
15 years 5 months ago
Multicast Algorithms for Multi-Channel Wireless Mesh Networks
— Multicast is a key technology that provides efficient data communication among a set of nodes for wireless multi-hop networks. In sensor networks and MANETs, multicast algorit...
Guo-Kai Zeng, Bo Wang 0001, Yong Ding, Li Xiao, Ma...
CCS
2007
ACM
15 years 5 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
PET
2007
Springer
15 years 5 months ago
Nymble: Anonymous IP-Address Blocking
Abstract. Anonymizing networks such as Tor allow users to access Internet services privately using a series of routers to hide the client’s IP address from the server. Tor’s su...
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, S...
GLOBECOM
2006
IEEE
15 years 4 months ago
A Proactive Scheme for QoS Enhanced Alternate Path Discovery in a Super-Peer Architecture
- In the next generation Internet, the network should evolve from a plain communication medium into an endless source of services available to the end-systems. We name these servic...
Thierry Rakotoarivelo, Patrick Sénac, Aruna...
84
Voted
SAC
2006
ACM
15 years 4 months ago
An anomaly-driven reverse proxy for web applications
Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the...
Fredrik Valeur, Giovanni Vigna, Christopher Kr&uum...