Sciweavers

710 search results - page 118 / 142
» Distributed Algorithms for the Placement of Network Services
Sort
View
WINET
2002
144views more  WINET 2002»
15 years 3 months ago
Exposure in Wireless Sensor Networks: Theory and Practical Solutions
Wireless ad-hoc sensor networks have the potential to provide the missing interface between the physical world and the Internet, thus impacting a large number of users. This conne...
Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Gia...
139
Voted
ICNP
2002
IEEE
15 years 8 months ago
Routing Bandwidth Guaranteed Paths with Local Restoration in Label Switched Networks
The emerging Multi-Protocol Label Switching (MPLS) networks enable network service providers to route bandwidth guaranteed paths between customer sites [3, 2, 8, 5]. This basic La...
Erran L. Li, Milind M. Buddhikot, Chandra Chekuri,...
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 3 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
SIGMETRICS
2008
ACM
106views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
Fully decentralized emulation of best-effort and processor sharing queues
Control of large distributed cloud-based services is a challenging problem. The Distributed Rate Limiting (DRL) paradigm was recently proposed as a mechanism for tackling this pro...
Rade Stanojevic, Robert Shorten
SASN
2004
ACM
15 years 9 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim