Sciweavers

1768 search results - page 311 / 354
» Optimal routing in Chord
Sort
View
BROADNETS
2007
IEEE
15 years 6 months ago
Strategic deployment of network monitors for attack attribution
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
Young June Pyun, Douglas S. Reeves
ICC
2007
IEEE
155views Communications» more  ICC 2007»
15 years 6 months ago
On Supporting Robust Voice Multicasting Over Ad Hoc Wireless Networks
Abstract— In this paper, we address the problem of voice multicasting in ad hoc wireless networks. The unique characteristics of voice traffic (viz. small packet size, high pack...
G. Venkat Raju, Tamma Bheemarjuna Reddy, C. Siva R...
ICCCN
2007
IEEE
15 years 6 months ago
k-hop Backbone Formation in Ad Hoc Networks
—Several recent research activities have started to recognize the relevant role of k-hop clustering in Mobile Ad hoc NETworks (MANET) to effectively support many relevant tasks, ...
Paolo Bellavista, Eugenio Magistretti
ICCCN
2007
IEEE
15 years 6 months ago
Large-Scale QoS-Aware Service-Oriented Networking with a Clustering-Based Approach
—Motivated by the fact that most of the existing QoS service composition solutions have limited scalability, we develop a hierarchical-based solution framework to achieve scalabi...
Jingwen Jin, Jin Liang, Jingyi Jin, Klara Nahrsted...
ICON
2007
IEEE
15 years 6 months ago
Fast Duplicate Address Detection for Mobile IPv6
Several components contribute to handover delay of Mobile IPv6, namely, movement detection time, address configuration time, binding registration time, and route optimization time....
Panita Pongpaibool, Pahol Sotthivirat, Sukumal I. ...