Sciweavers

5493 search results - page 877 / 1099
» Effectively Polynomial Simulations
Sort
View
116
Voted
TON
2008
95views more  TON 2008»
15 years 3 months ago
Integration of explicit effective-bandwidth-based QoS routing with best-effort routing
This paper presents a methodology for protecting low-priority best-effort (BE) traffic in a network domain that provides both virtual-circuit routing with bandwidth reservation for...
Stephen L. Spitler, Daniel C. Lee
109
Voted
TON
2008
75views more  TON 2008»
15 years 3 months ago
TVA: a DoS-limiting network architecture
We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the TVA architecture which builds on capabilities. With our approach, rather than send ...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
132
Voted
TPDS
2008
92views more  TPDS 2008»
15 years 3 months ago
Topology Design of Network-Coding-Based Multicast Networks
It is anticipated that a large amount of multicast traffic needs to be supported in future communication networks. The network coding technique proposed recently is promising for e...
Kaikai Chi, Xiaohong Jiang, Susumu Horiguchi, Miny...
132
Voted
TPDS
2008
136views more  TPDS 2008»
15 years 3 months ago
Data Gathering with Tunable Compression in Sensor Networks
We study the problem of constructing a data gathering tree over a wireless sensor network in order to minimize the total energy for compressing and transporting information from a ...
Yang Yu, Bhaskar Krishnamachari, Viktor K. Prasann...
121
Voted
TPDS
2008
88views more  TPDS 2008»
15 years 3 months ago
A Two-Hop Solution to Solving Topology Mismatch
The efficiency of Peer-to-Peer (P2P) systems is largely dependent on the overlay constructions. Due to the random selection of logical neighbors, there often exists serious topolog...
Yunhao Liu