Sciweavers

1266 search results - page 161 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
WD
2010
14 years 10 months ago
Uplink capacity analysis of OFDMA based cellular networks with reuse-1
Abstract--OFDMA based cellular radio networks aim to operate as close as possible to frequency reuse distance of one, where the whole spectrum would be available in every cell. Mod...
Maciej Mühleisen, Daniel Bültmann, Bernh...
IWCMC
2006
ACM
15 years 10 months ago
Tracers placement for IP traceback against DDoS attacks
This paper explores the tracers deployment problem for IP traceback methods how many and where the tracers should be deployed in the network to be effective for locating the attac...
Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-M...
WIOPT
2005
IEEE
15 years 9 months ago
NEURAL: A Self-Organizing Routing Algorithm for Ad Hoc Networks
This paper evaluates a self-organizing routing protocol for Ad Hoc network, called the NEUron Routing ALgorithm (NEURAL). NEURAL has been designed taking into account the learning...
Vicente E. Mujica V, Dorgham Sisalem, Radu Popescu...
EUROPAR
2005
Springer
15 years 9 months ago
AGNO: An Adaptive Group Communication Scheme for Unstructured P2P Networks
— We present the Adaptive Group Notification (AGNO) scheme for efficiently contacting large peer populations in unstructured Peer-to-Peer networks. AGNO defines a novel implic...
Dimitrios Tsoumakos, Nick Roussopoulos
ICDCS
2006
IEEE
15 years 10 months ago
On Estimating Tight-Link Bandwidth Characteristics over Multi-Hop Paths
Abstract— In this paper, we explore multi-hop bandwidth estimation assuming arbitrary cross-traffic at each node and develop a new probing method called Envelope that can asympt...
Seong-ryong Kang, Amit Bhati, Dmitri Loguinov, Xil...