Sciweavers

5234 search results - page 861 / 1047
» Simulation of Computer Network Attacks
Sort
View
NSDI
2007
15 years 6 months ago
R-BGP: Staying Connected in a Connected World
Many studies show that, when Internet links go up or down, the dynamics of BGP may cause several minutes of packet loss. The loss occurs even when multiple paths between the sende...
Nate Kushman, Srikanth Kandula, Dina Katabi, Bruce...
AINA
2005
IEEE
15 years 6 months ago
Round-Robin with FCFS Preemption: A Simple MAC Scheduling Scheme for Bluetooth Piconet
— Bluetooth is a short-range TDD (Time Division Duplex) wireless network that supports both circuit- and packetoriented applications. A piconet is composed of a device configure...
Li-Hsing Yen, Chi-Hung Liao
CONEXT
2008
ACM
15 years 5 months ago
ISP-friendly peer matching without ISP collaboration
In peer-to-peer (P2P) systems, a receiver needs to be matched with multiple senders, because peers have limited capacity and reliability. Efficient peer matching can reduce the co...
Cheng-Hsin Hsu, Mohamed Hefeeda
EURONGI
2008
Springer
15 years 5 months ago
Performance Evaluation of Overlay-Based Range Queries in Mobile Systems
Current mobility management systems are operator centralized, and focused on single link technologies. In heterogeneous wireless mesh networks, vertical handovers could be a length...
Amine M. Houyou, Alexander Stenzer, Hermann de Mee...
NSDI
2004
15 years 5 months ago
Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays
Structured peer-to-peer hash tables provide decentralization, self-organization, failure-resilience, and good worst-case lookup performance for applications, but suffer from high ...
Venugopalan Ramasubramanian, Emin Gün Sirer