Sciweavers

2562 search results - page 85 / 513
» An Internet without the Internet protocol
Sort
View
CCR
2005
104views more  CCR 2005»
13 years 10 months ago
Part I: buffer sizes for core routers
In this article we describe recent work on buffer sizing for core Internet routers. This work suggests that the widelyused rule of thumb leads to buffers which are much larger tha...
Damon Wischik, Nick McKeown
SIGMETRICS
2005
ACM
100views Hardware» more  SIGMETRICS 2005»
14 years 3 months ago
On AS-level path inference
The ability to discover the AS-level path between two end-points is valuable for network diagnosis, performance optimization, and reliability enhancement. Virtually all existing t...
Zhuoqing Morley Mao, Lili Qiu, Jia Wang, Yin Zhang
SOSP
2003
ACM
14 years 7 months ago
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...
SIGCOMM
2003
ACM
14 years 3 months ago
Network routing with path vector protocols: theory and applications
Path vector protocols are currently in the limelight, mainly because the inter-domain routing protocol of the Internet, BGP (Border Gateway Protocol), belongs to this class. In th...
João L. Sobrinho
CN
2007
144views more  CN 2007»
13 years 10 months ago
SPP: An anti-phishing single password protocol
Most users have multiple accounts on the Internet where each account is protected by a password. To avoid the headache in remembering and managing a long list of different and un...
Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Moham...