Sciweavers

336 search results - page 18 / 68
» Protocols and Impossibility Results for Gossip-Based Communi...
Sort
View
ICPP
1999
IEEE
15 years 4 months ago
Producer-Push - A Protocol Enhancement to Page-Based Software Distributed Shared Memory Systems
This paper describes a technique called producer-push that enhances the performance of a page-based software distributed shared memory system. Shared data, in software DSM systems...
Sven Karlsson, Mats Brorsson
INFOCOM
2002
IEEE
15 years 4 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
WWIC
2009
Springer
191views Communications» more  WWIC 2009»
15 years 6 months ago
Hop-to-Hop Reliability in IP-Based Wireless Sensor Networks - A Cross-Layer Approach
Abstract. To interconnect a wireless sensor network (WSN) to the Internet, we propose to use TCP/IP as the standard protocol for all network entities. We present a cross layer desi...
Gerald Wagenknecht, Markus Anwander, Torsten Braun
GLOBECOM
2008
IEEE
15 years 6 months ago
TCP-PCP: A Transport Control Protocol Based on the Prediction of Congestion Probability over Wired/Wireless Hybrid Networks
—Many of packet loss as a result of factors other than congestion impact the performance of TCP in wired/wirelss hybrid networks. Firstly, this paper proposes one concept of Cong...
Jin Ye, Jianxin Wang, Liang Rong, Weijia Jia
150
Voted
PE
2006
Springer
193views Optimization» more  PE 2006»
14 years 11 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...