Sciweavers

1080 search results - page 197 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
CCR
2007
107views more  CCR 2007»
14 years 9 months ago
Dynamic load balancing without packet reordering
Dynamic load balancing is a popular recent technique that protects ISP networks from sudden congestion caused by load spikes or link failures. Dynamic load balancing protocols, ho...
Srikanth Kandula, Dina Katabi, Shantanu Sinha, Art...
JCS
2006
116views more  JCS 2006»
14 years 9 months ago
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks. Our protocol exploits the property of ad hoc networks that each membe...
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jaj...
TPDS
1998
129views more  TPDS 1998»
14 years 9 months ago
The Offset Cube: A Three-Dimensional Multicomputer Network Topology Using Through-Wafer Optics
—Three-dimensional packaging technologies are critical for enabling ultra-compact, massively parallel processors (MPPs) for embedded applications. Through-wafer optical interconn...
W. Stephen Lacy, José Cruz-Rivera, D. Scott...
IPSN
2011
Springer
14 years 29 days ago
Exploration of path space using sensor network geometry
In a sensor network there are many paths between a source and a destination. An efficient method to explore and navigate in the ‘path space’ can help many important routing p...
Ruirui Jiang, Xiaomeng Ban, Mayank Goswami, Wei Ze...
WWW
2005
ACM
15 years 10 months ago
On the lack of typical behavior in the global Web traffic network
We offer the first large-scale analysis of Web traffic based on network flow data. Using data collected on the Internet2 network, we constructed a weighted bipartite clientserver ...
Mark Meiss, Filippo Menczer, Alessandro Vespignani