Sciweavers

388 search results - page 73 / 78
» Topology aware overlay networks
Sort
View
87
Voted
CONEXT
2006
ACM
15 years 3 months ago
Migrating home agents towards internet-scale mobility deployments
While the IETF standardization process of the Mobile IPv6 and Network Mobility (NEMO) protocols is almost complete, their large-scale deployment is not yet possible. With these te...
Ryuji Wakikawa, Guillaume Valadon, Jun Murai
ISPD
2006
ACM
108views Hardware» more  ISPD 2006»
15 years 3 months ago
Statistical clock tree routing for robustness to process variations
Advances in VLSI technology make clock skew more susceptible to process variations. Notwithstanding efficient zero skew routing algorithms, clock skew still limits post-manufactu...
Uday Padmanabhan, Janet Meiling Wang, Jiang Hu
RAID
2010
Springer
14 years 7 months ago
Behavior-Based Worm Detectors Compared
Abstract. Many worm detectors have been proposed and are being deployed, but the literature does not clearly indicate which one is the best. New worms such as IKEE.B (also known as...
Shad Stafford, Jun Li
TELSYS
2010
147views more  TELSYS 2010»
14 years 4 months ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...
ICC
2011
IEEE
253views Communications» more  ICC 2011»
13 years 9 months ago
Geo-Assisted Multicast Inter-Domain Routing (GMIDR) Protocol for MANETs
Abstract— Large military ad hoc networks are often characterized by the interconnection of heterogeneous domains. The same trend is emerging in civilian MANETs (e.g., search and ...
Konglin Zhu, Biao Zhou, Xiaoming Fu, Mario Gerla