Sciweavers

4037 search results - page 102 / 808
» Routing without ordering
Sort
View
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 9 months ago
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarc...
Bryan Ford
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 9 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
JCO
2002
77views more  JCO 2002»
13 years 8 months ago
Traffic Partition in WDM/SONET Rings to Minimize SONET ADMs
SONET(SynchronousOpticalNETworks)add-dropmultiplexers(ADMs)arethedominantcostfactor in the WDM(Wavelength Division Multiplexing)/SONET rings. The number of SONET ADMs required by a...
Gruia Calinescu, Peng-Jun Wan
INFOCOM
2010
IEEE
13 years 7 months ago
On the Aggregatability of Router Forwarding Tables
—The rapid growth of global routing tables has raised concerns among many Internet Service Providers. The most immediate concern regarding routing scalability is the size of the ...
Xin Zhao, Yaoqing Liu, Lan Wang, Beichuan Zhang
ICNP
2007
IEEE
14 years 3 months ago
Routing amid Colluding Attackers
Abstract— We propose the first practical solution to the longstanding problem of secure wireless routing in the presence of colluding attackers. Our secure routing protocol, Spr...
Jakob Eriksson, Michalis Faloutsos, Srikanth V. Kr...