Sciweavers

101 search results - page 10 / 21
» Use of Peer-To-Peer technology in Internet access networks a...
Sort
View
NSDI
2008
13 years 11 months ago
Effective Diagnosis of Routing Disruptions from End Systems
Internet routing events are known to introduce severe disruption to applications. So far effective diagnosis of routing events has relied on proprietary ISP data feeds, resulting ...
Ying Zhang, Zhuoqing Morley Mao, Ming Zhang
WOWMOM
2009
ACM
231views Multimedia» more  WOWMOM 2009»
14 years 3 months ago
Structure and evolution of a large-scale Wireless Community Network
In recent years, we have witnessed a trend towards open wireless access, mainly driven by the low cost of IEEE 802.11-capable equipment and its operation in unlicensed spectrum. T...
Fotios A. Elianos, Georgia Plakia, Pantelis A. Fra...
WWW
2008
ACM
14 years 9 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
MOBICOM
2004
ACM
14 years 2 months ago
End-to-end performance and fairness in multihop wireless backhaul networks
Wireless IEEE 802.11 networks in residences, small businesses, and public “hot spots” typically encounter the wireline access link (DSL, cable modem, T1, etc.) as the slowest ...
Violeta Gambiroza, Bahareh Sadeghi, Edward W. Knig...
SAINT
2008
IEEE
14 years 3 months ago
Local Production, Local Consumption Storage Economics for Peer-to-Peer Systems
Autonomy of peer-to-peer (P2P) systems requires some form of economies. Forwardable storage claims of Samsara[1] can define a common value in computer networks, and possibly be a...
Kenji Saito, Eiichi Morino