Sciweavers

1660 search results - page 231 / 332
» Forwarding in a content-based network
Sort
View
AINA
2006
IEEE
15 years 8 months ago
EC: an edge-based architecture against DDoS attacks and malware spread
The ability to limit unsolicited traffic in the Internet is important to defy DDoS attacks and to contain the spread of worms and viruses. The concept of capabilities, which requir...
Roger Karrer
DAGSTUHL
2007
15 years 6 months ago
On the Cost of Shifting Event Processing within Wireless Environments
With the emergence of wireless sensor networks, the issues of event recognition and processing have been partially shifted into the embedded domain. New processing capabilities on...
Kirsten Terfloth, Katharina Hahn, Agnès Voi...
SODA
2008
ACM
140views Algorithms» more  SODA 2008»
15 years 5 months ago
Minimizing average latency in oblivious routing
We consider the problem of minimizing average latency cost while obliviously routing traffic in a network with linear latency functions. This is roughly equivalent to minimizing t...
Prahladh Harsha, Thomas P. Hayes, Hariharan Naraya...
CN
2006
75views more  CN 2006»
15 years 4 months ago
Dynamic online QoS routing schemes: Performance and bounds
Several dynamic QoS routing techniques have been recently proposed for new IP networks based on label forwarding. However, no extensive performance evaluation and comparison is av...
Antonio Capone, Luigi Fratta, Fabio Martignon
TOPLAS
2010
101views more  TOPLAS 2010»
15 years 2 months ago
Nomadic pict: Programming languages, communication infrastructure overlays, and semantics for mobile computation
Pict project. We define two levels of abstraction as calculi with precise semantics: a low-level Nomadic π calculus with migration and location-dependent communication, and a hig...
Peter Sewell, Pawel T. Wojciechowski, Asis Unyapot...