Sciweavers

CCR
2004
113views more  CCR 2004»
13 years 11 months ago
Implementing aggregation and broadcast over Distributed Hash Tables
Peer-to-peer (P2P) networks represent an effective way to share information, since there are no central points of failure or bottleneck. However, the flip side to the distributive...
Ji Li, Karen R. Sollins, Dah-Yoh Lim
CCR
2004
66views more  CCR 2004»
13 years 11 months ago
Taming IP packet flooding attacks
Karthik Lakshminarayanan, Daniel Adkins, Adrian Pe...
CCR
2004
84views more  CCR 2004»
13 years 11 months ago
On making SCTP robust to spurious retransmissions
Network anomalies such as packet reordering and delay spikes can result in spurious retransmissions and degrade performance of reliable transport protocols such as TCP and SCTP. P...
Sourabh Ladha, Stephan Baucke, Reiner Ludwig, Paul...
CCR
2004
94views more  CCR 2004»
13 years 11 months ago
Honeycomb: creating intrusion detection signatures using honeypots
Abstract-- This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and p...
Christian Kreibich, Jon Crowcroft
CCR
2004
79views more  CCR 2004»
13 years 11 months ago
A case for run-time adaptation in packet processing systems
Most packet processing applications receive and process multiple types of packets. Today, the processors available within packet processing systems are allocated to packet types a...
Ravi Kokku, Taylor L. Riché, Aaron R. Kunze...
CCR
2004
93views more  CCR 2004»
13 years 11 months ago
Enabling large-scale wireless broadband: the case for TAPs
Abstract-- The vision is tantalizing: a high-performance, scalable, and widely deployed wireless Internet that facilitates services ranging from radically new and unforeseen applic...
Roger Karrer, Ashutosh Sabharwal, Edward W. Knight...
CCR
2004
69views more  CCR 2004»
13 years 11 months ago
Repeatable and realistic wireless experimentation through physical emulation
In wireless networking research, there has long existed a fundamental tension between experimental realism on one hand, and control and repeatability on the other hand. Hardware-b...
Glenn Judd, Peter Steenkiste
CCR
2004
72views more  CCR 2004»
13 years 11 months ago
Modeling wireless links for transport protocols
Wireless links have intrinsic characteristics that affect the performance of transport protocols; these include variable bandwidth, corruption, channel allocation delays, and asym...
Andrei Gurtov, Sally Floyd
CCR
2004
150views more  CCR 2004»
13 years 11 months ago
Performance evaluation and comparison of Westwood+, New Reno, and Vegas TCP congestion control
TCP congestion control has been designed to ensure Internet stability along with fair and efficient allocation of the network bandwidth. During the last decade, many congestion co...
Luigi Alfredo Grieco, Saverio Mascolo
CCR
2004
100views more  CCR 2004»
13 years 11 months ago
A real options framework to value network, protocol, and service architecture
This paper proposes a real options framework for evaluating architectural choices and the economic value of these alternative choices of networks, protocols, and services. Using p...
Mark Gaynor, Scott Bradner