Sciweavers

7329 search results - page 1242 / 1466
» Network Extractor Protocols
Sort
View
ICNP
2006
IEEE
15 years 10 months ago
Internet Cache Pollution Attacks and Countermeasures
Abstract— Proxy caching servers are widely deployed in today’s Internet. While cooperation among proxy caches can significantly improve a network’s resilience to denial-of-s...
Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, Yan C...
INFOCOM
2006
IEEE
15 years 10 months ago
TCP Internal Buffers Optimization for Fast Long-Distance Links
— In recent years, issues regarding the behavior of TCP in high-speed and long-distance networks have been extensively addressed in the networking research community, both becaus...
Andrea Baiocchi, Saverio Mascolo, Francesco Vacirc...
INFOCOM
2006
IEEE
15 years 10 months ago
Stall and Path Monitoring Issues in SCTP
Abstract— This paper presents how SCTP can stall in multihomed scenarios during failover and under certain circumstances. A stall is where an SCTP end-point ceases to communicate...
James Noonan, Philip Perry, Seán Murphy, Jo...
TRIDENTCOM
2006
IEEE
15 years 10 months ago
Creating wireless multi-hop topologies on space-constrained indoor testbeds through noise injection
— To evaluate routing protocols on a controlled indoor wireless testbed, the radio range must be compressed so that larger multi-hop topologies can be mapped into a laboratorysiz...
Sanjit Krishnan Kaul, Marco Gruteser, Ivan Seskar
MOMM
2006
ACM
168views Communications» more  MOMM 2006»
15 years 10 months ago
Mobile P2P Web Service Creation using SIP
: Telecommunication networks and the Internet are growing together. Peer-to-Peer (P2P) services which are originally offered by network providers, like telephony and messaging, ar...
Guido Gehlen, Fahad Aijaz, Yi Zhu, Bernhard Walke
« Prev « First page 1242 / 1466 Last » Next »