Sciweavers

1812 search results - page 259 / 363
» Stateless Routing in Network Simulations
Sort
View
NSDI
2007
13 years 11 months ago
Information Slicing: Anonymity Using Unreliable Overlays
This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the...
Sachin Katti, Jeff Cohen, Dina Katabi
CORR
2008
Springer
130views Education» more  CORR 2008»
13 years 9 months ago
Multicast Capacity of Optical WDM Packet Ring for Hotspot Traffic
Packet-switching WDM ring networks with a hotspot transporting unicast, multicast, and broadcast trac are important components of high-speed metropolitan area networks. For an arbi...
Matthias an der Heiden, Michel Sortais, Michael Sc...
SIGMETRICS
2008
ACM
13 years 8 months ago
Managing inter-domain traffic in the presence of bittorrent file-sharing
Overlay routing operating in a selfish manner is known to cause undesired instability when it interacts with native layer routing. We observe similar selfish behavior with the Bit...
Srinivasan Seetharaman, Mostafa H. Ammar
ICC
2007
IEEE
146views Communications» more  ICC 2007»
14 years 3 months ago
A Delay-Constrained Shared Mesh Restoration Scheme
—We present a multi-constrained routing algorithm, called Delay-constrained Pool Sharing (DPS), in a survivable mesh network. The goal of this algorithm is to find a pair of link...
Hassan Naser, Ming Gong
INFOCOM
2003
IEEE
14 years 2 months ago
An Evaluation of Scalable Application-Level Multicast Built Using Peer-To-Peer Overlays
— Structured peer-to-peer overlay networks such as CAN, Chord, Pastry, and Tapestry can be used to implement Internet-scale application-level multicast. There are two general app...
Miguel Castro, Michael B. Jones, Anne-Marie Kermar...