Sciweavers

1093 search results - page 196 / 219
» Probabilistic Location and Routing
Sort
View
IMC
2005
ACM
14 years 2 months ago
Flooding Attacks by Exploiting Persistent Forwarding Loops
In this paper, we present flooding attacks that exploit routing anomalies in the Internet. In particular, we focus on routing anomalies introduced by persistent forwarding loops....
Jianhong Xia, Lixin Gao, Teng Fei
IPPS
2003
IEEE
14 years 1 months ago
Contact-Based Architecture for Resource Discovery (CARD) in Large Scale MANets
In this paper we propose a novel architecture, CARD, for resource discovery in large scale MANets that may scale up to thousands of nodes. Our mechanism is suitable for resource d...
Ahmed Helmy, Saurabh Garg, Priyatham Pamu, Nitin N...
SIGMETRICS
2003
ACM
113views Hardware» more  SIGMETRICS 2003»
14 years 1 months ago
An empirical evaluation of wide-area internet bottlenecks
Conventional wisdom has been that the performance limitations in the current Internet lie at the edges of the network – i.e last mile connectivity to users, or access links of s...
Aditya Akella, Srinivasan Seshan, Anees Shaikh
SIGMOD
2010
ACM
255views Database» more  SIGMOD 2010»
14 years 1 months ago
Indexing multi-dimensional data in a cloud system
Providing scalable database services is an essential requirement for extending many existing applications of the Cloud platform. Due to the diversity of applications, database ser...
Jinbao Wang, Sai Wu, Hong Gao, Jianzhong Li, Beng ...
ESWS
2010
Springer
14 years 1 months ago
Finding Your Way through the Rijksmuseum with an Adaptive Mobile Museum Guide
Abstract. This paper describes a real-time routing system that implements a mobile museum tour guide for providing personalized tours tailored to the user position inside the museu...
Willem Robert van Hage, Natalia Stash, Yiwen Wang,...