Sciweavers

ICCCN
2008
IEEE
14 years 5 months ago
Publish/Subscribe Service in CAN-based P2P Networks: Dimension Mismatch and The Random Projection Approach
Abstract—CAN is a well-known DHT technique for contentbased P2P networks, where each node is assigned a zone in a virtual coordinate space to store the index of the data hashed i...
Duc A. Tran, Thinh Nguyen
ICCCN
2008
IEEE
14 years 5 months ago
Bandwidth Consumption Control and Service Differentiation for Video Streaming
—Multimedia streaming is resource demanding. It may starve other applications such as file transfer sharing the network, for example, in a smart home. To address the problem, we...
Can Basaran, Kyoung-Don Kang, Mehmet H. Suzer, Ki-...
ICCCN
2008
IEEE
14 years 5 months ago
Logical Topology Design for IP-over-WDM Networks: A Hybrid Approach for Minimum Protection Capacity
—The problem of designing high capacity and high bit rate IP-over-WDM networks, which can provide uninterrupted service in the presence of network equipment failures, continues t...
Muhammad S. Javed, Krishnaiyan Thulasiraman, Guoli...
ICCCN
2008
IEEE
14 years 5 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
ICCCN
2008
IEEE
14 years 5 months ago
Can Bilateral ISP Peering Lead to Network-Wide Cooperative Settlement
— The Internet includes thousands of Internet service providers (ISPs) which are interconnected to provide connectivity and service for end-users. Traditionally, the settlement b...
Yang Cheung, Dah-Ming Chiu, Jianwei Huang
ICCCN
2008
IEEE
14 years 5 months ago
Performance Study of Unstructured P2P Overlay Streaming Systems
—One of the major differences among current P2P solutions for multimedia streaming is the way they organize the exchange of multimedia data among their peers. We compare the perf...
Purvi Shah, Jawad Rasheed, Jehan-François P...
ICCCN
2008
IEEE
14 years 5 months ago
Fingerprint-Based Location Estimation with Virtual Access Points
— Location fingerprinting techniques generally make use of existing wireless network infrastructure. Consequently, the positions of the access points (APs), which constitute an ...
A. K. M. Mahtab Hossain, Hien Nguyen Van, Wee-Seng...
ICCCN
2008
IEEE
14 years 5 months ago
Massively Parallel Anomaly Detection in Online Network Measurement
—Detecting anomalies during the operation of a network is an important aspect of network management and security. Recent development of high-performance embedded processing syste...
Shashank Shanbhag, Tilman Wolf