Sciweavers

2722 search results - page 475 / 545
» Hastily formed networks
Sort
View
WEA
2010
Springer
250views Algorithms» more  WEA 2010»
14 years 3 months ago
Randomized Rounding for Routing and Covering Problems: Experiments and Improvements
We investigate how the recently developed different approaches to generate randomized roundings satisfying disjoint cardinality constraints behave when used in two classical algori...
Benjamin Doerr, Marvin Künnemann, Magnus Wahl...
ACSAC
2002
IEEE
14 years 3 months ago
Security of Internet Location Management
In the Mobile IPv6 protocol, the mobile node sends binding updates to its correspondents to inform them about its current location. It is well-known that the origin of this locati...
Tuomas Aura, Michael Roe, Jari Arkko
COMPSAC
2002
IEEE
14 years 3 months ago
Personalized Redirection of Communication
Universal access to information and data is an important goal of current research. Previously different forms of information and data, captured by different devices or held on dif...
Yuping Yang, M. Howard Williams
INFOCOM
2002
IEEE
14 years 3 months ago
FPAC: Fast, Fixed-Cost Authentication for Access to Reserved Resources
—Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services ar...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
INFOCOM
2002
IEEE
14 years 3 months ago
Impromptu Measurement Infrastructures using RTP
— Dedicated infrastructures for end-to-end measurements are complex to deploy and manage. Equipment cost, the requirements for reporting bandwidth, and the administrative diversi...
Ramón Cáceres, Nick G. Duffield, Tim...