Sciweavers

304 search results - page 27 / 61
» Measuring the Vulnerability of Interconnection Networks in E...
Sort
View
WISEC
2009
ACM
14 years 2 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
EXPCS
2007
13 years 11 months ago
RiceNIC: a reconfigurable network interface for experimental research and education
The evaluation of new network server architectures is usually performed experimentally using either a simulator or a hardware prototype. Accurate simulation of the hardwaresoftwar...
Jeffrey Shafer, Scott Rixner
MICRO
2006
IEEE
155views Hardware» more  MICRO 2006»
14 years 1 months ago
In-Network Cache Coherence
With the trend towards increasing number of processor cores in future chip architectures, scalable directory-based protocols for maintaining cache coherence will be needed. Howeve...
Noel Eisley, Li-Shiuan Peh, Li Shang
CONEXT
2009
ACM
13 years 8 months ago
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users
An accurate Internet topology graph is important in many areas of networking, from deciding ISP business relationships to diagnosing network anomalies. Most Internet mapping effor...
Kai Chen, David R. Choffnes, Rahul Potharaju, Yan ...
HICSS
2005
IEEE
204views Biometrics» more  HICSS 2005»
14 years 1 months ago
A Dynamic and Distributed Scatternet Formation Protocol for Real-life Bluetooth Scatternets
Bluetooth is a universal radio interface for short-range wireless networks. The basic Bluetooth network topology is a single-hop star-shaped piconet. Several such piconets can be ...
Deepak Jayanna, Gergely V. Záruba