Sciweavers

1657 search results - page 197 / 332
» Network flow spanners
Sort
View
CCR
2002
92views more  CCR 2002»
13 years 11 months ago
Controlling high bandwidth aggregates in the network
The current Internet infrastructure has very few built-in protection mechanisms and is therefore vulnerable to attacks and failures. In particular, recent events have illustrated ...
Ratul Mahajan, Steven M. Bellovin, Sally Floyd, Jo...
SOCIALCOM
2010
13 years 9 months ago
OSNAC: An Ontology-based Access Control Model for Social Networking Systems
Abstract--As the information flowing around in social networking systems is mainly related or can be attributed to their users, controlling access to such information by individual...
Amirreza Masoumzadeh, James B. D. Joshi
ICUMT
2009
13 years 9 months ago
Adaptive resource control in 2-hop ad-hoc networks
This paper presents a simple resource control mechanism with traffic scheduling for 2-hop ad-hoc networks, in which the Request-To-Send (RTS) packet is utilized to deliver feedback...
Yimeng Yang, Geert J. Heijenk, Boudewijn R. Haverk...
IFIP
2009
Springer
13 years 9 months ago
Consistency Analysis of Network Traffic Repositories
Traffic repositories with TCP/IP header information are very important for network analysis. Researchers often assume that such repositories reliably represent all traffic that has...
Elmer Lastdrager, Aiko Pras
MUE
2007
IEEE
75views Multimedia» more  MUE 2007»
14 years 5 months ago
A Swarm Intelligence inspired Autonomic Routing Scenario in Ubiquitous Sensor Networks
Autonomic computing has attracted large amount of attention as a novel computing paradigm in the past few years. In this paper, we explore the inherent accordance between autonomi...
Jin Wang, Brian J. d'Auriol, Young-Koo Lee, Sungyo...