Sciweavers

ISCC
2005
IEEE
14 years 2 months ago
Hierarchical Peer-to-Peer Networks Using Lightweight SuperPeer Topologies
The use of SuperPeers has been proposed to improve the performance of both Structured and Unstructured Peer-toPeer (P2P) Networks. In this paper, we study the performance of Yao-G...
Michael Kleis, Eng Keong Lua, Xiaoming Zhou
ISCC
2005
IEEE
114views Communications» more  ISCC 2005»
14 years 2 months ago
Localized Broadcast Incremental Power Protocol for Wireless Ad Hoc Networks
— As broadcasting is widely used for miscellaneous maintenance operations in wireless ad hoc networks, where energy is a scarce resource, an efficient broadcasting protocol is o...
François Ingelrest, David Simplot-Ryl
ISCC
2005
IEEE
14 years 2 months ago
Virtual Machine Management for Tele-Lab "IT-Security" Server
Tele-Lab “IT-Security” Server is a new concept for practical security education. The Tele-lab server builds a virtual security laboratory using lightweight virtual machines an...
Ji Hu, Dirk Cordel, Christoph Meinel
ISCC
2005
IEEE
14 years 2 months ago
Detection of Web-Based Attacks through Markovian Protocol Parsing
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
ISCC
2005
IEEE
116views Communications» more  ISCC 2005»
14 years 2 months ago
Link Buffer Sizing: A New Look at the Old Problem
We revisit the question of how much buffer an IP router should allocate for its Droptail FIFO link. For a long time, setting the buffer size to the bitrate-delay product has been ...
Sergey Gorinsky, Anshul Kantawala, Jonathan S. Tur...
ISCC
2005
IEEE
14 years 2 months ago
Describing Multidimensional Schedules for Media-Access Control in Time-Triggered Communication
A shared communication medium is characterized by multiple entities that use this medium by reading and writing from and to it. Write operations on the shared communication medium...
Sebastian Fischmeister
ISCC
2005
IEEE
14 years 2 months ago
Trie-Based Policy Representations for Network Firewalls
Network firewalls remain the forefront defense for most computer systems. These critical devices filter traffic by comparing arriving packets to a list of rules, or security po...
Errin W. Fulp, Stephen J. Tarsa
ISCC
2005
IEEE
14 years 2 months ago
Degree-Optimal Deterministic Routing for P2P Systems
We propose routing schemes that optimize the average number of hops for lookup requests in Peer–to–Peer (P2P) systems without adding any overhead to the system. Our work is in...
Gennaro Cordasco, Luisa Gargano, Mikael Hammar, Vi...
ISCC
2005
IEEE
146views Communications» more  ISCC 2005»
14 years 2 months ago
Preserving Area Coverage in Wireless Sensor Networks by Using Surface Coverage Relay Dominating Sets
— Sensor networks consist of autonomous nodes with limited battery and of base stations with theoritical infinite energy. Nodes can be sleep to extend the lifespan of the networ...
Jean Carle, Antoine Gallais, David Simplot-Ryl
ISCC
2005
IEEE
14 years 2 months ago
Emulating Web Cache Replacement Algorithms versus a Real System
L. G. Cárdenas, José A. Gil, Julio S...