Sciweavers

1336 search results - page 211 / 268
» SMTP Path Analysis
Sort
View
CGO
2007
IEEE
14 years 4 months ago
Code Compaction of an Operating System Kernel
General-purpose operating systems, such as Linux, are increasingly being used in embedded systems. Computational resources are usually limited, and embedded processors often have ...
Haifeng He, John Trimble, Somu Perianayagam, Saumy...
CISS
2007
IEEE
14 years 4 months ago
Detecting Malicious Behavior in Cooperative Diversity
—We consider a cooperative diversity scheme where a relay cooperatively enhances communication between a source and destination. In cooperative diversity, due to lack of a mechan...
Sintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon
ICC
2007
IEEE
14 years 4 months ago
Toward Valley-Free Inter-domain Routing
ASes in inter-domain routing receive little information about the quality of the routes they receive. This lack of information can lead to inefficient and even incorrect routing....
Sophie Y. Qiu, Patrick Drew McDaniel, Fabian Monro...
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 4 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
ICPP
2007
IEEE
14 years 4 months ago
Towards Location-aware Topology in both Unstructured and Structured P2P Systems
A self-organizing peer-to-peer system is built upon an application level overlay, whose topology is independent of underlying physical network. A well-routed message path in such ...
Tongqing Qiu, Guihai Chen, Mao Ye, Edward Chan, Be...