Sciweavers

138 search results - page 26 / 28
» Packet forwarding with source verification
Sort
View
NTMS
2009
IEEE
15 years 4 months ago
Performance Study of Node Placement for Congestion Control in Wireless Sensor Networks
— Performance of Wireless Sensor Networks (WSNs) can be affected when the network is deployed under different topologies. In this paper we present a performance study of congesti...
Vasos Vassiliou, Charalambos Sergiou
FPGA
2007
ACM
122views FPGA» more  FPGA 2007»
15 years 3 months ago
The shunt: an FPGA-based accelerator for network intrusion prevention
Today’s network intrusion prevention systems (IPSs) must perform increasingly sophisticated analysis—parsing protocols and interpreting application dialogs rather than simply ...
Nicholas Weaver, Vern Paxson, José M. Gonz&...
IPSN
2005
Springer
15 years 3 months ago
Geographic routing with limited information in sensor networks
Geographic routing with greedy relaying strategies have been widely studied as a routing scheme in sensor networks. These schemes assume that the nodes have perfect information ab...
Sundar Subramanian, Sanjay Shakkottai
NSDI
2008
14 years 12 months ago
Studying Black Holes in the Internet with Hubble
We present Hubble, a system that operates continuously to find Internet reachability problems in which routes exist to a destination but packets are unable to reach the destinatio...
Ethan Katz-Bassett, Harsha V. Madhyastha, John P. ...
CORR
2008
Springer
137views Education» more  CORR 2008»
14 years 9 months ago
Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis
Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet genera...
MinJi Kim, Muriel Médard, João Barro...