Sciweavers

288 search results - page 38 / 58
» Local Link Protection Scheme in IP Networks
Sort
View
CCS
2000
ACM
14 years 34 min ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
JSAC
2008
97views more  JSAC 2008»
13 years 7 months ago
Spectrally-efficient relay selection with limited feedback
This paper addresses the multiplexing loss that occurs in relay networks due to causality of relays and the halfduplex constraint. We devise relay selection methods to recover the ...
Ramy Tannious, Aria Nosratinia
CORR
2006
Springer
95views Education» more  CORR 2006»
13 years 7 months ago
Naming Games in Spatially-Embedded Random Networks
We investigate a prototypical agent-based model, the Naming Game, on random geometric networks. The Naming Game is a minimal model, employing local communications that captures th...
Qiming Lu, Gyorgy Korniss, Boleslaw K. Szymanski
ICC
2009
IEEE
139views Communications» more  ICC 2009»
13 years 5 months ago
Non Disruptive Data Services Towards Real-Time Traffic in Wireless Ad Hoc Networks
Abstract--Mobile wireless Ad hoc NETworks (MANETs) naturally support a traffic mix of elastic and real-time flows but the shared nature and lossy properties of the radio medium mak...
Jeremie Leguay, Hicham Khalife, Georgios Sotiropou...
MOBIHOC
2005
ACM
14 years 7 months ago
Temporal properties of low power wireless links: modeling and implications on multi-hop routing
Recently, several studies have analyzed the statistical properties of low power wireless links in real environments, clearly demonstrating the differences between experimentally o...
Alberto Cerpa, Jennifer L. Wong, Miodrag Potkonjak...