Sciweavers

VTC
2010
IEEE
185views Communications» more  VTC 2010»
13 years 10 months ago
Fuzzy Logic Aided Dynamic Source Routing in Cross-Layer Operation Assisted Ad Hoc Networks
1The classic Dynamic Source Routing (DSR) protocol opts for the route requiring the lowest number of hops for transmitting data from the source to the destination. However, owing t...
Jing Zuo, Soon Xin Ng, Lajos Hanzo
CONEXT
2008
ACM
14 years 2 months ago
Social DTN routing
Delay-tolerant network architectures exploit mobile devices carried by users to enable new networked applications. Efficiently routing information through these DTNs faces new cha...
Greg Bigwood, Tristan Henderson
DEXAW
2005
IEEE
125views Database» more  DEXAW 2005»
14 years 2 months ago
Exploiting Local Popularity to Prune Routing Indices in Peer-to-Peer Systems
Routing in unstructured peer-to-peer systems relies either on broadcasting (also called flooding) or on routing indices. An approach using routing indices is only scalable if the...
Stéphane Bressan, Achmad Nizar Hidayanto, Z...
ICNP
1997
IEEE
14 years 3 months ago
On path selection for traffic with bandwidth guarantees
Transmission ofmultimedia streams imposesa minimum-bandwidth requirementon the path being usedto ensureend-to-endQuality-ofService (QoS) guarantees. While any shortest-path algori...
Qingming Ma, Peter Steenkiste
SIGCOMM
1997
ACM
14 years 4 months ago
Internet Routing Instability
Abstract—This paper examines the network interdomain routing information exchanged between backbone service providers at the major U.S. public Internet exchange points. Internet ...
Craig Labovitz, G. Robert Malan, Farnam Jahanian
QOFIS
2004
Springer
14 years 5 months ago
A New Prediction-Based Routing and Wavelength Assignment Mechanism for Optical Transport Networks
In optical transport networks algorithms dealing with the lightpath selection process select routes and assign wavelengths based on the routing information obtained from the networ...
Eva Marín-Tordera, Xavier Masip-Bruin, Serg...
ACMSE
2004
ACM
14 years 5 months ago
Trust based adaptive on demand ad hoc routing protocol
In this paper, we propose a routing protocol that is based on securing the routing information from unauthorized users. Even though routing protocols of this category are already ...
Rajiv K. Nekkanti, Chung-wei Lee
IPOM
2005
Springer
14 years 5 months ago
Comprehensive Solution for Anomaly-Free BGP
The Internet consists of many self-administered and inter-connected AutonomousSystems(ASms). ASms exchangeinter-AS routing information with each other via the Border Gateway Protoc...
Ravi Musunuri, Jorge Arturo Cobb
HICSS
2005
IEEE
170views Biometrics» more  HICSS 2005»
14 years 6 months ago
Low-Bandwidth Topology Maintenance for Robustness in Structured Overlay Networks
— Structured peer-to-peer systems have emerged as infrastructures for resource sharing in large-scale, distributed, and dynamic environments. One challenge in these systems is to...
Ali Ghodsi, Luc Onana Alima, Seif Haridi
PODC
2006
ACM
14 years 6 months ago
Optimal-stretch name-independent compact routing in doubling metrics
We consider the problem of name-independent routing in doubling metrics. A doubling metric is a metric space whose doubling dimension is a constant, where the doubling dimension o...
Goran Konjevod, Andréa W. Richa, Donglin Xi...