— One of the key reasons overlay networks are seen as an excellent platform for large scale distributed systems is their resilience in the presence of node failures. This resilie...
Shelley Zhuang, Dennis Geels, Ion Stoica, Randy H....
—It is well known that IEEE 802.11 provides a physical layer multirate capability and, hence, MAC layer mechanisms are needed to exploit this capability. Several solutions have b...
— In wireless sensor networks, many protocols assume that if node A is able to interfere with node B’s packet reception, then node B is within node A’s communication range. I...
Gang Zhou, Tian He, John A. Stankovic, Tarek F. Ab...
— In this paper, information theoretic techniques are used to derive analytic expressions for the minimum expected length of control messages exchanged by proactive routing in a ...
Abstract— Existing random membership management algorithms provide each node with a small, uniformly random subset of global participants. However, many applications would bene...
— With the emergence of Voice over IP and other real-time business applications, there is a growing demand for an IP network with high service availability. Unfortunately, in tod...
Packet Classification (PC) has been a critical data path function for many emerging networking applications. An interesting approach is the use of TCAM to achieve deterministic, hi...
We propose DotSlash, a self-configuring and scalable rescue system, for handling web hotspots at dynamic content web sites. To support load migration for dynamic content, an orig...
— This paper presents DONet, a Data-driven Overlay Network for live media streaming. The core operations in DONet are very simple: every node periodically exchanges data availabi...
Xinyan Zhang, Jiangchuan Liu, Bo Li, Tak-Shing Pet...