Sciweavers

72 search results - page 5 / 15
» conext 2008
Sort
View
CONEXT
2008
ACM
13 years 10 months ago
Social DTN routing
Delay-tolerant network architectures exploit mobile devices carried by users to enable new networked applications. Efficiently routing information through these DTNs faces new cha...
Greg Bigwood, Tristan Henderson
CONEXT
2008
ACM
13 years 10 months ago
Distributed detection of large-scale attacks in the internet
Despite the many research activities that are performed in the field of attack prevention, detection, and mitigation, largescale attacks like Distributed Denial-of-Service (DDoS) ...
Thomas Gamer
CONEXT
2008
ACM
13 years 10 months ago
Recursive temporal namespaces
Recursive temporal (RT) namespaces extend spatial namespaces such as IP with the notion of a nested time interval. RT namespace is an architectural approach to dealing with the un...
Venkata K. Pingali, Joseph D. Touch
CONEXT
2008
ACM
13 years 10 months ago
Nonlinear modeling of the internet delay structure
Modeling the Internet delay structure is an important issue in designing large-scale distributed systems. However, linear models fail to characterize Triangle Inequality Violation...
Xiao Wang, Yang Chen, Beixing Deng, Xing Li
CONEXT
2008
ACM
13 years 10 months ago
Waiting-line auction for WiFi pricing
We model the relationship between a WLAN access point (AP) and a paying mobile station (MS) as a waiting-line auction [1] in which clients bids for transmission using the length o...
Tao Han, Liang Ma, Yuan'an Liu