Sciweavers

1035 search results - page 141 / 207
» System Services for Implementing Ad-Hoc Routing Protocols
Sort
View
ICNP
2006
IEEE
14 years 1 months ago
Characterizing and Mitigating Inter-domain Policy Violations in Overlay Routes
— The Internet is a complex structure arising from the interconnection of numerous autonomous systems (AS), each exercising its own administrative policies to reflect the commer...
Srinivasan Seetharaman, Mostafa H. Ammar
INFOCOM
1996
IEEE
14 years 2 days ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
POLICY
2004
Springer
14 years 1 months ago
Policy-based Congestion Management for an SMS Gateway
We present a policy-based approach to managing congestions in Short Message Service (SMS) systems. Congestion situations typically occur on SMS Gateways (SMSGs), which route SMS m...
Alberto Gonzalez Prieto, Roberto Cosenza, Rolf Sta...
CCS
2009
ACM
14 years 2 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...
ISORC
2002
IEEE
14 years 25 days ago
IKE 2-Implementing the Stateful Distributed Object Paradigm
— This paper describes IKE 2, which is distributed object computing middleware that supports the creation of interoperable realtime distributed applications. These applications a...
J. Russell Noseworthy