Sciweavers

ICNP
2006
IEEE
14 years 5 months ago
DPTree: A Balanced Tree Based Indexing Framework for Peer-to-Peer Systems
— Peer-to-peer (P2P) systems have been widely used for exchange of voluminous information and resources among thousands or even millions of users. Since shared data are normally ...
Mei Li, Wang-Chien Lee, Anand Sivasubramaniam
ICNP
2006
IEEE
14 years 5 months ago
Reducing Congestion Effects in Wireless Networks by Multipath Routing
Abstract—We propose a solution to improve fairness and increase throughput in wireless networks with location information. Our approach consists of a multipath routing protocol, ...
Lucian Popa 0002, Costin Raiciu, Ion Stoica, David...
ICNP
2006
IEEE
14 years 5 months ago
O-MAC: A Receiver Centric Power Management Protocol
— Energy efficiency is widely understood to be one of the dominant considerations for Wireless Sensor Networks. Based on historical data and technology trends, the receiver ener...
Hui Cao, Ken Parker, Anish Arora
ICNP
2006
IEEE
14 years 5 months ago
Modeling Heterogeneous User Churn and Local Resilience of Unstructured P2P Networks
Zhongmei Yao, Derek Leonard, Xiaoming Wang, Dmitri...
ICNP
2006
IEEE
14 years 5 months ago
On the Practical and Security Issues of Batch Content Distribution Via Network Coding
— File distribution via network coding has received a lot of attention lately. However, direct application of network coding may have security problems. In particular, attackers ...
Qiming Li, Dah-Ming Chiu, John C. S. Lui
ICNP
2006
IEEE
14 years 5 months ago
Internet Cache Pollution Attacks and Countermeasures
Abstract— Proxy caching servers are widely deployed in today’s Internet. While cooperation among proxy caches can significantly improve a network’s resilience to denial-of-s...
Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, Yan C...
ICNP
2006
IEEE
14 years 5 months ago
Forensic Analysis for Epidemic Attacks in Federated Networks
— We present the design of a Network Forensic Alliance (NFA), to allow multiple administrative domains (ADs) to jointly locate the origin of epidemic spreading attacks. ADs in th...
Yinglian Xie, Vyas Sekar, Michael K. Reiter, Hui Z...
ICNP
2006
IEEE
14 years 5 months ago
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks
— Many multicast overlay networks maintain application-specific performance goals such as bandwidth, latency, jitter and loss rate by dynamically changing the overlay structure ...
Aaron Walters, David John Zage, Cristina Nita-Rota...
ICNP
2006
IEEE
14 years 5 months ago
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
— The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with st...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
ICNP
2006
IEEE
14 years 5 months ago
The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design
— The BitTorrent (BT) file sharing protocol is popular due to its scalability property and the incentive mechanism to reduce free-riding. However, in designing such P2P file sh...
Bin Fan, Dah-Ming Chiu, John C. S. Lui