Sciweavers

5234 search results - page 917 / 1047
» Simulation of Computer Network Attacks
Sort
View
139
Voted
DSN
2004
IEEE
15 years 7 months ago
Optimal Object State Transfer - Recovery Policies for Fault Tolerant Distributed Systems
Recent developments in the field of object-based fault tolerance and the advent of the first OMG FTCORBA compliant middleware raise new requirements for the design process of dist...
Panagiotis Katsaros, Constantine Lazos
DSN
2004
IEEE
15 years 7 months ago
FRTR: A Scalable Mechanism for Global Routing Table Consistency
This paper presents a scalable mechanism, Fast Routing Table Recovery (FRTR), for detecting and correcting route inconsistencies between neighboring BGP routers. The large size of...
Lan Wang, Daniel Massey, Keyur Patel, Lixia Zhang
134
Voted
FTDCS
2004
IEEE
15 years 7 months ago
A Distributed Buffer Management Approach Supporting IPv6 Mobility
In wireless local area networks (WLANs), mobility support is essential for providing seamless services. The current Mobile IP standard suffers several problems, especially for acc...
Yu-Hung Liu, Yaw-Chung Chen
AINA
2010
IEEE
15 years 6 months ago
Applying TCP-Friendly Congestion Control to Concurrent Multipath Transfer
Abstract--The steadily growing importance of Internetbased applications and their resilience requirements lead to a rising number of multi-homed sites. The idea of Concurrent Multi...
Thomas Dreibholz, Martin Becke, Jobin Pulinthanath...
112
Voted
NSDI
2007
15 years 5 months ago
Information Slicing: Anonymity Using Unreliable Overlays
This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the...
Sachin Katti, Jeff Cohen, Dina Katabi