Sciweavers

1396 search results - page 273 / 280
» A Tale of Two Futures
Sort
View
GLOBECOM
2010
IEEE
13 years 6 months ago
Unveiling Popularity of BitTorrent Darknets
BitTorrent is today's most influential peer-to-peer system. Currently BitTorrent has two very different operating models: (1) public trackers, and (2) private trackers (also k...
Xiaowei Chen, Xiaowen Chu, Jiangchuan Liu
IMC
2010
ACM
13 years 6 months ago
The effect of packet loss on redundancy elimination in cellular wireless networks
Network-level redundancy elimination (RE) algorithms reduce traffic volume on bandwidth-constrained network paths by avoiding the transmission of repeated byte sequences. Previous...
Cristian Lumezanu, Katherine Guo, Neil Spring, Bob...
LCTRTS
2010
Springer
13 years 6 months ago
Compiler directed network-on-chip reliability enhancement for chip multiprocessors
Chip multiprocessors (CMPs) are expected to be the building blocks for future computer systems. While architecting these emerging CMPs is a challenging problem on its own, program...
Ozcan Ozturk, Mahmut T. Kandemir, Mary Jane Irwin,...
MASS
2010
173views Communications» more  MASS 2010»
13 years 6 months ago
Efficient routing in delay tolerant networks with correlated node mobility
Abstract--In a delay tolerant network (DTN), nodes are connected intermittently and the future node connections are mostly unknown. Since in these networks, a fully connected path ...
Eyuphan Bulut, Sahin Cem Geyik, Boleslaw K. Szyman...
USS
2010
13 years 6 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...