Sciweavers

241 search results - page 32 / 49
» Accountability in hosted virtual networks
Sort
View
ICNP
2009
IEEE
14 years 2 months ago
Scalable IP Lookups using Shape Graphs
—Recently, there has been much renewed interest in developing compact data structures for packet processing functions such as longest prefix-match for IP lookups. This has been ...
Haoyu Song, Murali S. Kodialam, Fang Hao, T. V. La...
LCN
2006
IEEE
14 years 1 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood
IPTPS
2004
Springer
14 years 1 months ago
Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays
Structured peer-to-peer (p2p) overlay networks provide a decentralized, self-organizing substrate for distributed applicad support powerful abstractions such as distributed hash t...
Alan Mislove, Peter Druschel
CSE
2009
IEEE
14 years 18 days ago
Social Learning Applications in Resource Constrained Networks
Efficient design of social networking applications must take account of two guiding principles: the adaptive processes by which humans learn and spread new information, and the co...
Ali Saidi, Mahesh V. Tripunitara, Mojdeh Mohtashem...
IMC
2006
ACM
14 years 1 months ago
A study of malware in peer-to-peer networks
Peer-to-peer (P2P) networks continue to be popular means of trading content. However, very little protection is in place to make sure that the files exchanged in these networks a...
Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta