Sciweavers

5234 search results - page 913 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICDCS
2002
IEEE
15 years 8 months ago
Routing Indices For Peer-to-Peer Systems
Finding information in a peer-to-peer system currently requires either a costly and vulnerable central index, or flooding the network with queries. In this paper we introduce the...
Arturo Crespo, Hector Garcia-Molina
ICDCS
2002
IEEE
15 years 8 months ago
Clustering Algorithms for Content-Based Publication-Subscription Systems
We consider efficient communication schemes based on both network-supported and application-level multicast techniques for content-based publication-subscription systems. We show...
Anton Riabov, Zhen Liu, Joel L. Wolf, Philip S. Yu...
119
Voted
ICNP
2002
IEEE
15 years 8 months ago
An Investigation of Inter-Domain Control Aggregation Procedures
Current Quality of Service models such as those embodied in the Differentiated Services proposals, rely on data path aggregation to achieve scalability. Data path aggregation bund...
Rute Sofia, Roch Guérin, Pedro Veiga
LCN
2002
IEEE
15 years 8 months ago
Parallel Packet Switching Using Multiplexors with Virtual Input Queues
Parallel Packet Switches (PPS) use internal, parallel switch planes that operate at less than line speed. A PPS can scale-up to faster line speeds than a single-plane switch can. ...
Ahmed Aslam, Kenneth J. Christensen
NOSSDAV
2001
Springer
15 years 8 months ago
Video over TCP with receiver-based delay control
Unicasting video streams over TCP connections is a challenging problem because video sources cannot normally adapt to delay and throughput variations of TCP connections. This pape...
Pai-Hsiang Hsiao, H. T. Kung, Koan-Sin Tan