Sciweavers

3134 search results - page 580 / 627
» simulation 2010
Sort
View
100
Voted
SIGCOMM
2010
ACM
15 years 28 days ago
How secure are secure interdomain routing protocols
In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. To inform discussions of which vari...
Sharon Goldberg, Michael Schapira, Peter Hummon, J...
120
Voted
SIGCOMM
2010
ACM
15 years 28 days ago
Symbiotic routing in future data centers
Building distributed applications for data centers is hard. CamCube explores whether replacing the traditional switchbased network with a directly connected topology makes it easi...
Hussam Abu-Libdeh, Paolo Costa, Antony I. T. Rowst...
119
Voted
SIGCOMM
2010
ACM
15 years 28 days ago
NetFence: preventing internet denial of service from inside out
Denial of Service (DoS) attacks frequently happen on the Internet, paralyzing Internet services and causing millions of dollars of financial loss. This work presents NetFence, a s...
Xin Liu, Xiaowei Yang, Yong Xia
SIGCOMM
2010
ACM
15 years 28 days ago
Predictable 802.11 packet delivery from wireless channel measurements
RSSI is known to be a fickle indicator of whether a wireless link will work, for many reasons. This greatly complicates operation because it requires testing and adaptation to fin...
Daniel Halperin, Wenjun Hu, Anmol Sheth, David Wet...
172
Voted
SIGCOMM
2010
ACM
15 years 28 days ago
Fine-grained channel access in wireless LAN
Modern communication technologies are steadily advancing the physical layer (PHY) data rate in wireless LANs, from hundreds of Mbps in current 802.11n to over Gbps in the near fut...
Kun Tan, Ji Fang, Yuanyang Zhang, Shouyuan Chen, L...