Sciweavers

5234 search results - page 981 / 1047
» Simulation of Computer Network Attacks
Sort
View
127
Voted
ICDCS
2010
IEEE
15 years 6 months ago
Guaranteeing BGP Stability with a Few Extra Paths
Abstract—Policy autonomy exercised by Autonomous Systems (ASes) on the Internet can result in persistent oscillations in Border Gateway Protocol, the Internet’s inter-domain ro...
Rachit Agarwal, Virajith Jalaparti, Matthew Caesar...
126
Voted
EUROCAST
2007
Springer
132views Hardware» more  EUROCAST 2007»
15 years 6 months ago
Using Omnidirectional BTS and Different Evolutionary Approaches to Solve the RND Problem
RND (Radio Network Design) is an important problem in mobile telecommunications (for example in mobile/cellular telephony), being also relevant in the rising area of sensor network...
Miguel A. Vega-Rodríguez, Juan Antonio G&oa...
141
Voted
NOSSDAV
2010
Springer
15 years 6 months ago
Mesh-based peer-to-peer layered video streaming with taxation
Recent advance in scalable video coding (SVC) makes it possible for users to receive the same video with different qualities. To adopt SVC in P2P streaming, two key design questio...
Hao Hu, Yang Guo, Yong Liu
126
Voted
EUROPAR
2006
Springer
15 years 6 months ago
SEER: Scalable Energy Efficient Relay Schemes in MANETs
In Mobile Ad Hoc Networks (MANETs), broadcasting is widely used to support many applications. Several adaptive broadcast schemes have been proposed to reduce the number of rebroadc...
Lin-Fei Sung, Cheng-Lin Wu, Yi-Kai Chiang, Shyh-In...
101
Voted
CONEXT
2008
ACM
15 years 4 months ago
Online estimation of RF interference
Increased AP density in enterprise WLANs leads to increasing RF interference and decreasing performance. An important step towards mitigating this problem is to construct precise ...
Nabeel Ahmed, Usman Ismail, Srinivasan Keshav, Kon...