Sciweavers

1630 search results - page 17 / 326
» Secure Overlay Network Design
Sort
View
IPPS
2005
IEEE
14 years 3 months ago
To Unify Structured and Unstructured P2P Systems
Most of current peer-to-peer designs build their own system overlays independent of the physical one. Nodes within unstructured systems form a random overlay, on the contrary, str...
Honghao Wang, Yingwu Zhu, Yiming Hu
DCOSS
2005
Springer
14 years 3 months ago
Design of Adaptive Overlays for Multi-scale Communication in Sensor Networks
In wireless sensor networks, energy and communication bandwidth are precious resources. Traditionally, layering has been used as a design principle for network stacks; hence routin...
Santashil PalChaudhuri, Rajnish Kumar, Richard G. ...
ICNP
2005
IEEE
14 years 3 months ago
Can coexisting overlays inadvertently step on each other?
By allowing end hosts to make routing decisions at the application level, different overlay networks may unintentionally interfere with each other. This paper describes how multip...
Ram Keralapura, Chen-Nee Chuah, Nina Taft, Gianluc...
ACSAC
2007
IEEE
14 years 4 months ago
Routing in the Dark: Pitch Black
In many networks, such as mobile ad-hoc networks and friend-to-friend overlay networks, direct communication between nodes is limited to specific neighbors. Often these networks ...
Nathan S. Evans, Chris GauthierDickey, Christian G...
NSDI
2004
13 years 11 months ago
MACEDON: Methodology for Automatically Creating, Evaluating, and Designing Overlay Networks
Currently, researchers designing and implementing largescale overlay services employ disparate techniques at each stage in the production cycle: design, implementation, experiment...
Adolfo Rodriguez, Charles Edwin Killian, Sooraj Bh...