Sciweavers

3483 search results - page 3 / 697
» Forward
Sort
View
IMC
2005
ACM
14 years 3 months ago
Flooding Attacks by Exploiting Persistent Forwarding Loops
In this paper, we present flooding attacks that exploit routing anomalies in the Internet. In particular, we focus on routing anomalies introduced by persistent forwarding loops....
Jianhong Xia, Lixin Gao, Teng Fei
ICPP
2007
IEEE
14 years 4 months ago
Incentive-Driven P2P Anonymity System: A Game-Theoretic Approach
– Anonymous communication systems built on P2P infrastructures using anonymity forwarders are frequently affected by the churn problem, i.e. frequent joins and leaves of nodes. T...
Souvik Ray, Giora Slutzki, Zhao Zhang
WOWMOM
2009
ACM
127views Multimedia» more  WOWMOM 2009»
14 years 4 months ago
A framework for adaptive opportunistic forwarding in wireless networks
We present our initial work on the design and of an opportunistic forwarding scheme for a wireless network. The main focus in our work is to take advantage of the interplay of the...
Niki Gazoni, Vangelis Angelakis, Raffaele Bruno, M...
AINA
2004
IEEE
14 years 1 months ago
A Small IP Forwarding Table Using Hashing
As the demand for high bandwidth on the Internet increases, it is required to build next generation routers with the capability of forwarding multiple millions of packets per secon...
Yeim-Kuan Chang, Wen-Hsin Cheng
INFOCOM
2008
IEEE
14 years 4 months ago
An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks
—In wireless ad-hoc sensor networks, an important issue often faced in geographic greedy forwarding routing is the “local minimum phenomenon” which is caused by deployment ho...
Zhen Jiang, Junchao Ma, Wei Lou, Jie Wu