Sciweavers

988 search results - page 169 / 198
» Routing in a delay tolerant network
Sort
View
ACSAC
2007
IEEE
14 years 3 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
TDSC
2010
146views more  TDSC 2010»
13 years 3 months ago
Fault Localization via Risk Modeling
Automated, rapid, and effective fault management is a central goal of large operational IP networks. Today's networks suffer from a wide and volatile set of failure modes, wh...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...
HPDC
2007
IEEE
14 years 3 months ago
Failure-aware checkpointing in fine-grained cycle sharing systems
Fine-Grained Cycle Sharing (FGCS) systems aim at utilizing the large amount of idle computational resources available on the Internet. Such systems allow guest jobs to run on a ho...
Xiaojuan Ren, Rudolf Eigenmann, Saurabh Bagchi
PAM
2009
Springer
14 years 3 months ago
Queen: Estimating Packet Loss Rate between Arbitrary Internet Hosts
Estimate of packet-loss rates between arbitrary Internet hosts is critical for many large-scale distributed applications, including overlay routing, P2P media streaming, VoIP, and ...
Angela Wang, Cheng Huang, Jin Li, Keith W. Ross
INFOCOM
2003
IEEE
14 years 2 months ago
Increasing the Robustness of IP Backbones in the Absence of Optical Level Protection
— There are two fundamental technology issues that challenge the robustness of IP backbones. First, SONET protection is gradually being removed because of its high cost (while SO...
Frédéric Giroire, Antonio Nucci, Nin...