Sciweavers

894 search results - page 161 / 179
» Internet Routing
Sort
View
TDSC
2011
13 years 2 months ago
Nymble: Blocking Misbehaving Users in Anonymizing Networks
—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of...
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sea...
JNSM
2010
110views more  JNSM 2010»
13 years 2 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...
TIT
2010
82views Education» more  TIT 2010»
13 years 2 months ago
Average message delivery time for small-world networks in the continuum limit
Small-world networks are networks in which the graphical diameter of the network is as small as the diameter of random graphs but whose nodes are highly clustered when compared wit...
Hazer Inaltekin, Mung Chiang, H. Vincent Poor
INFOCOM
2009
IEEE
14 years 2 months ago
An Economically-Principled Generative Model of AS Graph Connectivity
We explore the problem of modeling Internet connectivity at the Autonomous System (AS) level and present an economically-principled dynamic model that reproduces key features of t...
Jacomo Corbo, Shaili Jain, Michael Mitzenmacher, D...
MSS
2007
IEEE
153views Hardware» more  MSS 2007»
14 years 1 months ago
Hybrid Host/Network Topologies for Massive Storage Clusters
The high demand for large scale storage capacity calls for the availability of massive storage solutions with high performance interconnects. Although cluster file systems are rap...
Asha Andrade, Ungzu Mun, Dong Hwan Chung, Alexande...