Sciweavers

1657 search results - page 242 / 332
» Network flow spanners
Sort
View
CIIT
2004
131views Communications» more  CIIT 2004»
13 years 11 months ago
Effectiveness of rate-limiting in mitigating flooding DOS attacks
This paper investigates the effectiveness of rate-limiting in mitigating TCP-based flooding Denial of Service (DoS) attacks. Rate-limiting is used as a DoS defense mechanism to di...
Jarmo Mölsä
ICWN
2003
13 years 11 months ago
The Effect of Disengaging RTS/CTS Dialogue in IEEE 802.11 MAC Protocol
In this paper, we study the effect of using or disengaging the RTS/CTS dialogue in IEEE 802.11 DCF MAC protocol incorporating the realistic condition under which carrier sensing, ...
Laura Huei-jiun Ju, Izhak Rubin
WSC
2004
13 years 11 months ago
A BGP Attack Against Traffic Engineering
As the Internet grows, traffic engineering has become a widely-used technique to control the flow of packets. For the inter-domain routing, traffic engineering relies on configura...
Jintae Kim, Steven Y. Ko, David M. Nicol, Xenofont...
SIGCOMM
2010
ACM
13 years 10 months ago
Experimenting with multipath TCP
It is becoming the norm for small mobile devices to have access to multiple technologies for connecting to the Internet. This gives researchers an increasing interest for solution...
Sébastien Barré, Olivier Bonaventure...
WICOMM
2008
83views more  WICOMM 2008»
13 years 9 months ago
iPTT: peer-to-peer push-to-talk for VoIP
This paper proposes iPTT, a peer-to-peer Push-to-Talk (PTT) service for Voice over IP (VoIP). In iPTT, a distributed and mobile-operator independent network architecture is presen...
Jiun-Ren Lin, Ai-Chun Pang, Yung-Chi Wang