Sciweavers

682 search results - page 105 / 137
» Analytic Evaluation of RED Performance
Sort
View
LCN
2007
IEEE
14 years 1 months ago
Towards Stateless Single-Packet IP Traceback
The current Internet architecture allows malicious nodes to disguise their origin during denial-of-service attacks with IP spoofing. A well-known solution to identify these nodes...
Rafael P. Laufer, Pedro B. Velloso, Daniel de Oliv...
NETCOOP
2007
Springer
14 years 1 months ago
A Network Formation Game Approach to Study BitTorrent Tit-for-Tat
The Tit-for-Tat strategy implemented in BitTorrent (BT) clients is generally considered robust to selfish behaviours. The authors of [1] support this belief studying how Tit-for-T...
Giovanni Neglia, Giuseppe Lo Presti, Honggang Zhan...
VLDB
2007
ACM
166views Database» more  VLDB 2007»
14 years 1 months ago
To Share or Not To Share?
Intuitively, aggressive work sharing among concurrent queries in a database system should always improve performance by eliminating redundant computation or data accesses. We show...
Ryan Johnson, Nikos Hardavellas, Ippokratis Pandis...
GLOBECOM
2006
IEEE
14 years 1 months ago
Hierarchical Location Management for Transport Layer Mobility
— IP mobility can be handled at different layers of the protocol stack. Mobile IP has been developed to handle mobility of Internet hosts at the network layer. As an alternative ...
Shaojian Fu, Mohammed Atiquzzaman
ICDCS
2006
IEEE
14 years 1 months ago
A Semantic Overlay for Self- Peer-to-Peer Publish/Subscribe
Publish/Subscribe systems provide a useful platform for delivering data (events) from publishers to subscribers in an anonymous fashion in distributed networks. In this paper, we ...
Emmanuelle Anceaume, Maria Gradinariu, Ajoy Kumar ...