Sciweavers

5234 search results - page 856 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICDCSW
2007
IEEE
15 years 10 months ago
UBCA: Utility-Based Clustering Architecture for Peer-to-Peer Systems
Peer-to-Peer (P2P) systems are currently used in a variety of applications. File sharing applications and ad hoc networking have fueled the usage of these systems. P2P systems gen...
Brent Lagesse, Mohan Kumar
ICPP
2007
IEEE
15 years 10 months ago
Towards Location-aware Topology in both Unstructured and Structured P2P Systems
A self-organizing peer-to-peer system is built upon an application level overlay, whose topology is independent of underlying physical network. A well-routed message path in such ...
Tongqing Qiu, Guihai Chen, Mao Ye, Edward Chan, Be...
128
Voted
HPCC
2007
Springer
15 years 10 months ago
Multi-domain Topology-Aware Grouping for Application-Layer Multicast
Application-layer multicast (ALM) can solve most of the problems of IP-based multicast. Topology-aware approach of ALM is more attractive because it exploits underlying network top...
Jianqun Cui, Yanxiang He, Libing Wu, Naixue Xiong,...
DSN
2006
IEEE
15 years 10 months ago
Improving the Fault Resilience of Overlay Multicast for Media Streaming
This paper addresses the problem of fault resilience of overlay-based live media streaming from two aspects: (1) how to construct a stable multicast tree that minimizes the negati...
Guang Tan, Stephen A. Jarvis, Daniel P. Spooner
142
Voted
CONEXT
2006
ACM
15 years 10 months ago
SMARTA: a self-managing architecture for thin access points
Optimally choosing operating parameters for access points in an enterprise wireless LAN environment is a difficult and well-studied problem. Unlike past work, the SMARTA self-man...
Nabeel Ahmed, Srinivasan Keshav