Sciweavers

170 search results - page 31 / 34
» Prohibitive-link Detection and Routing Protocol
Sort
View
CONEXT
2005
ACM
13 years 9 months ago
Achieving sub-50 milliseconds recovery upon BGP peering link failures
We first show by measurements that BGP peering links fail as frequently as intradomain links and usually for short periods of time. We propose a new fast-reroute technique where ...
Olivier Bonaventure, Clarence Filsfils, Pierre Fra...
EIT
2008
IEEE
14 years 1 months ago
Defending selective forwarding attacks in WMNs
—Wireless Mesh Networks (WMNs) have emerged recently as a promising technology for next-generation wireless networking to provide wide variety of applications that cannot be supp...
Devu Manikantan Shila, Tricha Anjali
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
14 years 21 days ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
ICNP
1999
IEEE
13 years 11 months ago
HAWAII: A Domain-based Approach for Supporting Mobility in Wide-Area Wireless Networks
Mobile IP is the current standard for supporting macromobility of mobile hosts. However, in the case of micromobility support, there are several competing proposals. In this paper,...
Ramachandran Ramjee, Thomas F. La Porta, Sandra R....
DCOSS
2006
Springer
13 years 10 months ago
The Virtual Pheromone Communication Primitive
We propose a generic communication primitive designed for sensor networks. Our primitive hides details of network communication while retaining sufficient programmer control over t...
Leo Szumel, John D. Owens