Sciweavers

329 search results - page 60 / 66
» Requirements for and Evaluation of RMI Protocols for Scienti...
Sort
View
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 1 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
CONEXT
2009
ACM
13 years 8 months ago
Traffic management and resource allocation in small wired/wireless networks
We consider the problem of traffic management in small networks with both wireless and wired devices, connected to the Internet through a single gateway. Examples of such networks...
Christos Gkantsidis, Thomas Karagiannis, Peter B. ...
GI
2004
Springer
14 years 27 days ago
Distributed Job Scheduling in a Peer-to-Peer Video Recording System
: Since the advent of Gnutella, Peer-to-Peer (P2P) protocols have matured towards a fundamental design element for large-scale, self-organising distributed systems. Many research e...
Curt Cramer, Kendy Kutzner, Thomas Fuhrmann
ICC
2007
IEEE
14 years 1 months ago
Using Resource Pools for Pre-Signaled Restoration LSP in ASON Networks
— When considering network restoration, the amount of reserved resources has an important impact on network performance in that it can restrict the acceptance of new connections....
Florence Kolberg, David Harle
PPAM
2005
Springer
14 years 1 months ago
Asymmetric Scheduling and Load Balancing for Real-Time on Linux SMP
The ARTiS system, a real-time extension of the GNU/Linux scheduler dedicated to SMP (Symmetric Multi-Processors) systems is proposed. ARTiS exploits the SMP architecture to guarant...
Éric Piel, Philippe Marquet, Julien Soula, ...