Sciweavers

CONEXT
2008
ACM
13 years 10 months ago
Packet-dropping adversary identification for data plane security
Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly el...
Xin Zhang, Abhishek Jain 0002, Adrian Perrig
CONEXT
2008
ACM
13 years 10 months ago
Advantages of a PCE-based control plane for LISP
The Locator/Identifier Separation Protocol (LISP) is one of the candidate solutions to address the scalability issues in inter-domain routing. The current proposals for its contro...
Alberto Castro, Martín Germán, Xavie...
CONEXT
2008
ACM
13 years 10 months ago
Observing slow crustal movement in residential user traffic
It is often argued that rapidly increasing video content along with the penetration of high-speed access is leading to explosive growth in the Internet traffic. Contrary to this p...
Kenjiro Cho, Kensuke Fukuda, Hiroshi Esaki, Akira ...
CONEXT
2008
ACM
13 years 10 months ago
A priority-layered approach to transport for high bandwidth-delay product networks
High-speed organizational networks running over leased fiber-optic lines or VPNs suffer from the well-known limitations of TCP over long-fat pipes. High-performance protocols like...
Vidhyashankar Venkataraman, Paul Francis, Murali S...
CONEXT
2008
ACM
13 years 10 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
CONEXT
2008
ACM
13 years 10 months ago
Inter-domain routing using topology information
Abstract - This paper proposes an architecture for interdomain routing, called DTIA
Pedro Amaral, Luis Bernardo, Paulo Pinto
CONEXT
2008
ACM
13 years 10 months ago
Capacity estimation of ADSL links
Daniele Croce, Taoufik En-Najjary, Guillaume Urvoy...
CONEXT
2008
ACM
13 years 10 months ago
Packet doppler: network monitoring using packet shift detection
Due to recent large-scale deployments of delay and losssensitive applications, there are increasingly stringent demands on the monitoring of service level agreement metrics. Altho...
Tongqing Qiu, Jian Ni, Hao Wang, Nan Hua, Yang Ric...
CONEXT
2008
ACM
13 years 10 months ago
Power-law chord architecture in P2P overlays
In this paper, we propose to extend the topology of Chord to a bidirectional graph to provide a super-peer based lookup algorithm and an efficient resource localization service at...
Salma Ktari, Artur Hecker, Houda Labiod
CONEXT
2008
ACM
13 years 10 months ago
TDM MAC protocol design and implementation for wireless mesh networks
We present the design, implementation, and evaluation of a Time Division Multiplex (TDM) MAC protocol for multihop wireless mesh networks using a programmable wireless platform. E...
Dimitrios Koutsonikolas, Theodoros Salonidis, Henr...