Sciweavers

1660 search results - page 163 / 332
» Forwarding in a content-based network
Sort
View
CIIT
2007
161views Communications» more  CIIT 2007»
15 years 6 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
NETWORKING
2008
15 years 6 months ago
Adaptive Multi-topology IGP Based Traffic Engineering with Near-Optimal Network Performance
In this paper we present an intelligent multi-topology IGP (MT-IGP) based intra-domain traffic engineering (TE) scheme that is able to handle unexpected traffic fluctuations with n...
Ning Wang, Kin-Hon Ho, George Pavlou
MASCOTS
2000
15 years 6 months ago
Stateless Routing in Network Simulations
The memory resources required by network simulations can grow quadratically with size of the simulated network. In simulations that use routing tables at each node to perform perh...
George F. Riley, Mostafa H. Ammar, Richard Fujimot...
COMCOM
2008
100views more  COMCOM 2008»
15 years 4 months ago
Multicast algorithms in service overlay networks
Overlay routing has been proposed to enhance the reliability and performance of IP networks, since it can bypass congestion and transient outages by forwarding traffic through one ...
Dario Pompili, Caterina M. Scoglio, Luca Lopez
COMCOM
2008
80views more  COMCOM 2008»
15 years 4 months ago
Transforming general networks into feed-forward by using turn-prohibition
The issue of breaking cycles in communication networks is an important topic for several reasons. For instance, it is required when transparent bridges are filling the forwarding ...
Juan Echagüe, Jesús E. Villadangos, Vi...