Sciweavers

1172 search results - page 49 / 235
» MIPv6 experimental evaluation using overlay networks
Sort
View
SDM
2012
SIAM
273views Data Mining» more  SDM 2012»
11 years 10 months ago
A Framework for the Evaluation and Management of Network Centrality
Network-analysis literature is rich in node-centrality measures that quantify the centrality of a node as a function of the (shortest) paths of the network that go through it. Exi...
Vatche Ishakian, Dóra Erdös, Evimaria ...
SIGCOMM
2004
ACM
14 years 1 months ago
Locating internet bottlenecks: algorithms, measurements, and implications
The ability to locate network bottlenecks along end-to-end paths on the Internet is of great interest to both network operators and researchers. For example, knowing where bottlen...
Ningning Hu, Erran L. Li, Zhuoqing Morley Mao, Pet...
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 7 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
INFOCOM
2008
IEEE
14 years 2 months ago
Searching for Rare Objects Using Index Replication
—Searching for objects is a fundamental problem for popular peer-to-peer file-sharing networks that contribute to much of the traffic on today’s Internet. While existing prot...
Krishna Puttaswamy, Alessandra Sala, Ben Y. Zhao
DCOSS
2009
Springer
13 years 5 months ago
Empirical Evaluation of Wireless Underground-to-Underground Communication in Wireless Underground Sensor Networks
Abstract. Many applications for irrigation management and environment monitoring exploit buried sensors wired-connected to the soil surface for information retrieval. Wireless Unde...
Agnelo R. Silva, Mehmet C. Vuran