Sciweavers

482 search results - page 73 / 97
» On routing table growth
Sort
View
DBISP2P
2004
Springer
162views Database» more  DBISP2P 2004»
14 years 1 months ago
CISS: An Efficient Object Clustering Framework for DHT-Based Peer-to-Peer Applications
Distributed Hash Tables (DHTs) have been widely adopted in many Internet-scale P2P systems. Emerging P2P applications such as massively multi player online games (MMOGs) and P2P ca...
Jinwon Lee, Hyonik Lee, Seungwoo Kang, Sungwon Pet...
INFOCOM
2002
IEEE
14 years 20 days ago
SAVE: Source Address Validity Enforcement Protocol
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...
DEBS
2010
ACM
13 years 11 months ago
Stochastic performance analysis and capacity planning of publish/subscribe systems
Publish/subscribe systems are used increasingly often as a communication mechanism in loosely-coupled distributed applications. With their gradual adoption in mission critical are...
Arnd Schröter, Gero Mühl, Samuel Kounev,...
ACSAC
2004
IEEE
13 years 11 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu
CCR
2008
122views more  CCR 2008»
13 years 7 months ago
Cyclops: the AS-level connectivity observatory
In this paper we present Cyclops, a system that collects and displays information of AS-level connectivity extracted from looking glasses, route-servers and BGP tables and updates...
Ying-Ju Chi, Ricardo V. Oliveira, Lixia Zhang