Sciweavers

ICON
2007
IEEE
14 years 3 months ago
A Study of the TKIP Cryptographic DoS Attack
—Wireless networks, especially those based on 802.11, have found widespread use in domestic, commercial, educational, military and public-safety environments. The security of the...
Stephen Mark Glass, Vallipuram Muthukkumarasamy
ICON
2007
IEEE
14 years 3 months ago
Erlang B as a Performance Model for IP Flows
— Flow-based networking has gained momentum in the research community in recent years. It allows improved performance guarantees and dynamic, load-aware routing. Flowbased networ...
Alexander A. Kist
ICON
2007
IEEE
14 years 3 months ago
Node Localisation in Wireless Ad Hoc Networks
— Wireless ad hoc networks often require a method for estimating their nodes’ locations. Typically this is achieved by the use of pair-wise measurements between nodes and their...
Jon Arnold, Nigel Bean, Miro Kraetzl, Matthew Roug...
ICON
2007
IEEE
14 years 3 months ago
Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks
-- This paper presents a hardware based cache scheme to detect misbehaving nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upper-layer s...
Hongxun Liu, José G. Delgado-Frias, Sirisha...
ICON
2007
IEEE
14 years 3 months ago
"Free-riding" traffic problem in routing overlay networks
—In this paper, we discuss the “free-riding” traffic problem in routing overlay networks, which is mainly caused by a policy mismatch between the overlay routing and the und...
Go Hasegawa, Masayoshi Kobayashi, Masayuki Murata,...
ICON
2007
IEEE
14 years 3 months ago
Myth: An Accurate and Scalable Network Coordinate System under High Node Churn Rate
—Network coordinate (NC) system is an efficient mechanism to predict Internet distance (latency) with limited times of measurement. In this paper, we focus on the node churn pro...
Yang Chen, Genyi Zhao, Ang Li, Beixing Deng, Xing ...
ICON
2007
IEEE
14 years 3 months ago
Congestion Aware Routing in Hybrid Wireless Mesh Networks
— Multi-radio Wireless Mesh Networks (WMN) are gaining lot of popularity owing to their increased application to community and public safety networks. WMNs form a static wireless...
Asad Amir Pirzada, Ryan Wishart, Marius Portmann
ICON
2007
IEEE
14 years 3 months ago
A Cache Architecture for Counting Bloom Filters
— Within packet processing systems, lengthy memory accesses greatly reduce performance. To overcome this limitation, network processors utilize many different techniques, e.g., u...
Mahmood Ahmadi, Stephan Wong
ICON
2007
IEEE
14 years 3 months ago
Definition and Implementation of Logical Function Blocks Compliant to ForCES Specification
—IETF ForCES (Forwarding and Control Element Separation) is defining specifications for interfaces and modular resources abstractions in open programmable network equipments. Acc...
Ligang Dong, Fenggen Jia, Weiming Wang