Sciweavers

239 search results - page 8 / 48
» On the interaction between overlay routing and underlay rout...
Sort
View
SASO
2009
IEEE
15 years 6 months ago
Self-organized Fault-tolerant Routing in Peer-to-Peer Overlays
—In sufficiently large heterogeneous overlays message loss and delays are likely to occur. This has a significant impact on overlay routing, especially on longer paths. The exi...
Wojciech Galuba, Karl Aberer, Zoran Despotovic, Wo...
SIGDIAL
2010
14 years 9 months ago
Route Communication in Dialogue: a Matter of Principles
The present study uses the dialogue paradigm to explore route communication. It revolves around the analysis of a corpus of route instructions produced in real-time interaction wi...
Theodora Koulouri, Stanislao Lauria
GLOBECOM
2007
IEEE
15 years 6 months ago
Using Type-of-Relationship (ToR) Graphs to Select Disjoint Paths in Overlay Networks
— Routing policies used in the Internet can be restrictive, limiting communication between source-destination pairs to one path, when often better alternatives exist. To avoid ro...
Sameer Qazi, Tim Moors
MOBIHOC
2002
ACM
15 years 11 months ago
Characterizing the interaction between routing and MAC protocols in ad-hoc networks
We empirically study the effect of mobility and interaction between various input parameters on the performance of protocols designed for wireless ad-hoc networks. An important ob...
Christopher L. Barrett, Achla Marathe, Madhav V. M...
CORR
2008
Springer
107views Education» more  CORR 2008»
14 years 11 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg