Sciweavers

CN
2010
130views more  CN 2010»
13 years 9 months ago
CoreCast: How core/edge separation can help improving inter-domain live streaming
The rapid growth of broadband access has popularized multimedia services, which nowadays contribute to a large part of Internet traffic. Among this content, the broadcasting of li...
Loránd Jakab, Albert Cabellos-Aparicio, Tho...
WIOPT
2010
IEEE
13 years 10 months ago
Cooperative diversity routing in wireless networks
—In this paper, we explore physical layer cooperative communication in order to design network layer routing algorithms that are energy efficient. We assume each node in the net...
Mostafa Dehghan, Majid Ghaderi, Dennis Goeckel
CCR
2004
120views more  CCR 2004»
13 years 11 months ago
MAC-layer anycasting in ad hoc networks
A wireless ad hoc network is formed by a group of wireless hosts, without the use of any infrastructure. To enable communication, hosts cooperate among themselves to forward packet...
Romit Roy Choudhury, Nitin H. Vaidya
CONEXT
2009
ACM
14 years 19 days ago
Online optimization of 802.11 mesh networks
802.11 wireless mesh networks are ubiquitous, but suffer from severe performance degradations due to poor synergy between the 802.11 CSMA MAC protocol and higher layers. Several s...
Theodoros Salonidis, Georgios Sotiropoulos, Roch G...
33
Voted
ACSAC
2000
IEEE
14 years 4 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
INFOCOM
2005
IEEE
14 years 5 months ago
Design and implementation of network puzzles
Abstract— Client puzzles have been proposed in a number of protocols as a mechanism for mitigating the effects of distributed denial of service (DDoS) attacks. In order to provid...
Wu-chi Feng, Edward C. Kaiser, A. Luu
SASN
2006
ACM
14 years 5 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
ICWMC
2006
IEEE
14 years 5 months ago
A Predictive Handoff Approach for Mobile IP
: We present a predictive handoff mechanism that can predict the occurrence of L2 handoff well. It can be used as a trigger for Mobile IP to start network layer handoff ahead exact...
Da-Wei Zhang, Yi Yao
ICMCS
2006
IEEE
119views Multimedia» more  ICMCS 2006»
14 years 5 months ago
Adaptive Multimedia Flow Regulation and Delay Analysis for End-Hosts in P2P Networks
This paper proposes a novel adaptive algorithm based on a new soft-regulator (σ, ρ, λ) for concurrent multimedia flows at end hosts. Our algorithm has the following features: ...
Weijia Jia
GLOBECOM
2006
IEEE
14 years 5 months ago
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...