Sciweavers

336 search results - page 18 / 68
» Protocols and Impossibility Results for Gossip-Based Communi...
Sort
View
ICPP
1999
IEEE
14 years 1 months ago
Producer-Push - A Protocol Enhancement to Page-Based Software Distributed Shared Memory Systems
This paper describes a technique called producer-push that enhances the performance of a page-based software distributed shared memory system. Shared data, in software DSM systems...
Sven Karlsson, Mats Brorsson
INFOCOM
2002
IEEE
14 years 1 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
WWIC
2009
Springer
191views Communications» more  WWIC 2009»
14 years 3 months ago
Hop-to-Hop Reliability in IP-Based Wireless Sensor Networks - A Cross-Layer Approach
Abstract. To interconnect a wireless sensor network (WSN) to the Internet, we propose to use TCP/IP as the standard protocol for all network entities. We present a cross layer desi...
Gerald Wagenknecht, Markus Anwander, Torsten Braun
GLOBECOM
2008
IEEE
14 years 3 months ago
TCP-PCP: A Transport Control Protocol Based on the Prediction of Congestion Probability over Wired/Wireless Hybrid Networks
—Many of packet loss as a result of factors other than congestion impact the performance of TCP in wired/wirelss hybrid networks. Firstly, this paper proposes one concept of Cong...
Jin Ye, Jianxin Wang, Liang Rong, Weijia Jia
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 8 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...