Results 1 - 10
of
15,385
Restoring End-to-End Resilience in the Presence of Middleboxes
"... Abstract—The philosophy upon which the Internet was built places the intelligence close to the edge. As the Internet has matured, intermediate devices or middleboxes, such as firewalls or application gateways, have been introduced, thereby weakening the end-to-end nature of the network. As a result, ..."
Abstract
- Add to MetaCart
Abstract—The philosophy upon which the Internet was built places the intelligence close to the edge. As the Internet has matured, intermediate devices or middleboxes, such as firewalls or application gateways, have been introduced, thereby weakening the end-to-end nature of the network. As a result
The Problem of End-to-end Security for Proxy-based Systems
- In Proc. of Protocols for Multimedia Systems, PROMS2000
, 2000
"... Proxies can provide valuable services for today's increasingly heterogeneous computing environment by providing various kinds of adaptations and enhancements. By breaking the end-to-end nature of the communication, proxies render the task of providing end-to-end security much harder or even imp ..."
Abstract
- Add to MetaCart
Proxies can provide valuable services for today's increasingly heterogeneous computing environment by providing various kinds of adaptations and enhancements. By breaking the end-to-end nature of the communication, proxies render the task of providing end-to-end security much harder or even
A Case for End System Multicast
- in Proceedings of ACM Sigmetrics
, 2000
"... Abstract — The conventional wisdom has been that IP is the natural protocol layer for implementing multicast related functionality. However, more than a decade after its initial proposal, IP Multicast is still plagued with concerns pertaining to scalability, network management, deployment and suppor ..."
Abstract
-
Cited by 1290 (24 self)
- Add to MetaCart
of multicast support from routers to end systems has the potential to address most problems associated with IP Multicast. However, the key concern is the performance penalty associated with such a model. In particular, End System Multicast introduces duplicate packets on physical links and incurs larger end-to-end
Monetary Policy Shocks: What Have we Learned and to What End?
, 1998
"... This paper reviews recent research that grapples with the question: What happens after an exogenous shock to monetary policy? We argue that this question is interesting because it lies at the center of a particular approach to assessing the empirical plausibility of structural economic models that c ..."
Abstract
-
Cited by 988 (26 self)
- Add to MetaCart
effects of a monetary policy shock in the sense that inference is robust across a large subset of the identification schemes that have been considered in the literature. We document the nature of this agreement as
Secure Routing for Mobile Ad Hoc Networks
- MOBILE COMPUTING AND COMMUNICATIONS REVIEW
, 2002
"... For such self-organizing infrastructures as mobile ad hoc
networks , envisioned to operate in an open, collaborative,
and highly volatile environment, the importance of secu-
rity cannot be underrated. The provision of comprehen-
sive secure communication mandates that both route dis-
covery and dat ..."
Abstract
-
Cited by 599 (14 self)
- Add to MetaCart
with the route discovery to make itself part of a
route, and then corrupt the in-transit data. Protection of
data transmission is addressed through our related Secure
Message Transmission Protocol (SMT), which provides a
flexible, end-to-end secure data forwarding scheme that
naturally complement SRP. Here we
The Concept of a Linguistic Variable and its Application to Approximate Reasoning
- Journal of Information Science
, 1975
"... By a linguistic variable we mean a variable whose values are words or sentences in a natural or artificial language. I:or example, Age is a linguistic variable if its values are linguistic rather than numerical, i.e., young, not young, very young, quite young, old, not very oldand not very young, et ..."
Abstract
-
Cited by 1430 (9 self)
- Add to MetaCart
By a linguistic variable we mean a variable whose values are words or sentences in a natural or artificial language. I:or example, Age is a linguistic variable if its values are linguistic rather than numerical, i.e., young, not young, very young, quite young, old, not very oldand not very young
Intrinsic and extrinsic motivations: Classic definitions and new directions.
- Contemporary Educational Psychology,
, 2000
"... Intrinsic and extrinsic types of motivation have been widely studied, and the distinction between them has shed important light on both developmental and educational practices. In this review we revisit the classic definitions of intrinsic and extrinsic motivation in light of contemporary research ..."
Abstract
-
Cited by 635 (8 self)
- Add to MetaCart
and theory. Intrinsic motivation remains an important construct, reflecting the natural human propensity to learn and assimilate. However, extrinsic motivation is argued to vary considerably in its relative autonomy and thus can either reflect external control or true self-regulation. The relations of both
Illusion and well-being: A social psychological perspective on mental health.
- Psychological Bulletin,
, 1988
"... Many prominent theorists have argued that accurate perceptions of the self, the world, and the future are essential for mental health. Yet considerable research evidence suggests that overly positive selfevaluations, exaggerated perceptions of control or mastery, and unrealistic optimism are charac ..."
Abstract
-
Cited by 988 (20 self)
- Add to MetaCart
is heavily weighted toward the positive end of the scale. Of course, this imbalance does not in and of itself provide evidence that such views are unrealistic or illusory. Evidence of this nature is, however, available. First, there exists a pervasive tendency to see the self as better than others
On End-to-end Throughput of Opportunistic Routing
- in Multirate and Multihop Wireless Networks,” in IEEE Infocom 2008
"... Abstract — Routing in multi-hop wireless networks presents a great challenge mainly due to unreliable wireless links and interference among concurrent transmissions. Recently, a new routing paradigm, opportunistic routing (OR), is proposed to cope with the unreliable transmissions by exploiting the ..."
Abstract
-
Cited by 50 (9 self)
- Add to MetaCart
and prioritization on the maximum end-to-end throughput or capacity of OR. Taking into consideration of wireless interference, we propose a new method of constructing transmission conflict graphs- we propose transmitter based conflict graph in contrast to link conflict graph. Then, we introduce the concept
Active Networking and the End-to-End Argument
- In Intl. Conf. on Network Protocols (ICNP'97
, 1997
"... Active networking is the placement of usercontrollable computing functionality in the switching nodes of a network. The end-to-end argument states that functions should be placed "in" the network only if they can be cost-effectively implemented there. We argue that active networking is a n ..."
Abstract
-
Cited by 33 (4 self)
- Add to MetaCart
natural consequence of the end-to-end argument, because certain functions can be most effectively implemented with information that is only available inside the network. We propose a performance model for quantifying the benefit of implementing a particular functionality solely in the end system versus
Results 1 - 10
of
15,385