Sciweavers

666 search results - page 21 / 134
» Describing and simulating internet routes
Sort
View
PE
2006
Springer
114views Optimization» more  PE 2006»
13 years 7 months ago
On the performance of Internet worm scanning strategies
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend agai...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
SIGCOMM
1999
ACM
14 years 8 days ago
Load-Sensitive Routing of Long-Lived IP Flows
Internet service providers face a daunting challenge in provisioning network resources, due to the rapid growth of the Internet and wide fluctuations in the underlying traffic pa...
Anees Shaikh, Jennifer Rexford, Kang G. Shin
CN
2000
72views more  CN 2000»
13 years 7 months ago
Security issues in control, management and routing protocols
Abstract-- The TCP/IP suite, the basis for today's Internet, lacks even the most basic mechanisms of authentication. As usage of the Internet increases, its scarcity of built-...
Madalina Baltatu, Antonio Lioy, Fabio Maino, Danie...
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 6 months ago
Delay-Constrained Multicast Routing Algorithm Based on Average Distance Heuristic
Multicast is the ability of a communication network to accept a single message from an application and to deliver copies of the message to multiple recipients at different locatio...
Ling Zhou, Wei-xiong Ding, Yu-xi Zhu
BROADNETS
2007
IEEE
14 years 2 months ago
Route diversity: A future for transmission protocols?
—This contribution is attempting to show how a route diversity can improve the traffic behavior of a connection between two network entities. The most used transmission protocol...
Foued Melakessou, Ulrich Sorger, Zdzislaw Suchanec...