Results 1 - 10
of
658
Tor: The secondgeneration onion router,”
- in 13th USENIX Security Symposium. Usenix,
, 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract
-
Cited by 1229 (33 self)
- Add to MetaCart
, and a practical design for location-hidden services via rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability
Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination
, 2001
"... The demand for streaming multimedia applications is growing at an incredible rate. In this paper, we propose Bayeux, an efficient application-level multicast system that scales to arbitrarily large receiver groups while tolerating failures in routers and network links. Bayeux also includes specific ..."
Abstract
-
Cited by 465 (12 self)
- Add to MetaCart
The demand for streaming multimedia applications is growing at an incredible rate. In this paper, we propose Bayeux, an efficient application-level multicast system that scales to arbitrarily large receiver groups while tolerating failures in routers and network links. Bayeux also includes specific
On Optimal Location of Switches/Routers and Interconnection
, 1998
"... We address the computer communication network design problem of optimal location of switches/ routers as well as interconnection (OLSRI) of the core network. This problem is applicable, for example, in the network topological architecture design arising in ATM PNNI environment or IP/ATM networking e ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
We address the computer communication network design problem of optimal location of switches/ routers as well as interconnection (OLSRI) of the core network. This problem is applicable, for example, in the network topological architecture design arising in ATM PNNI environment or IP/ATM networking
Locating Internet Routing Instabilities
- SIGCOMM'04
, 2004
"... This paper presents a methodology for identifying the autonomous system (or systems) responsible when a routing change is observed and propagated by BGP. The origin of such a routing instability is deduced by examining and correlating BGP updates for many prefixes gathered at many observation points ..."
Abstract
-
Cited by 142 (9 self)
- Add to MetaCart
policies that are compatible with inferred peering /customer/provider relationships. In these simulations, in which network and router behavior are "ideal", we inject inter-AS link failures and demonstrate that our methodology can effectively identify most origins of instability. We then develop
Detecting SYN Flooding Attacks
- In Proceedings of the IEEE Infocom
, 2002
"... We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a victim server itself, we detect the SYN flooding attacks at leaf routers that connect end hosts to the Internet. The simplicity of our ..."
Abstract
-
Cited by 215 (8 self)
- Add to MetaCart
We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a victim server itself, we detect the SYN flooding attacks at leaf routers that connect end hosts to the Internet. The simplicity
MetaRouter: bioinformatics for bioremediation
- Nucleic Acids Res
, 2005
"... Bioremediation, the exploitation of biological catalysts (mostly microorganisms) for removing pollutants from the environment, requires the integration of huge amounts of data from different sources. We have developed MetaRouter, a system for maintaining heterogeneous information related to bioremed ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
Bioremediation, the exploitation of biological catalysts (mostly microorganisms) for removing pollutants from the environment, requires the integration of huge amounts of data from different sources. We have developed MetaRouter, a system for maintaining heterogeneous information related
Distributed router architecture for packet-routed optical networks
- PROC. FOURTH WORKING CONFERENCE ON OPTICAL NETWORK DESIGN AND MODELLING (ONDM 2000
, 2000
"... A new proposal for an optical packet-routed network based on a distributed router architecture in a WDM network is described. Buffering, scheduling and wavelength assignment functions are carried out in routers located at the edge of the network. The destination address is encoded by a given wavelen ..."
Abstract
- Add to MetaCart
A new proposal for an optical packet-routed network based on a distributed router architecture in a WDM network is described. Buffering, scheduling and wavelength assignment functions are carried out in routers located at the edge of the network. The destination address is encoded by a given
Stored Program Routers
, 2000
"... In this paper we present an abstract execution model for active networking that blends the notions of universal computing device and network router. Pivotal element of this architecture is a generalized route table that stores forwarding data as well as program instructions. The route table correspo ..."
Abstract
- Add to MetaCart
In this paper we present an abstract execution model for active networking that blends the notions of universal computing device and network router. Pivotal element of this architecture is a generalized route table that stores forwarding data as well as program instructions. The route table
Route Optimization
- in Mobile IP", Work in Progress
, 2001
"... Community networks a b s t r a c t Wireless technologies are rapidly evolving and the users are demanding the possibility of changing their point of attachment to the Internet (i.e. Access Routers) without breaking the IP communications. This can be achieved by using Mobile IP or NEMO. However, mobi ..."
Abstract
-
Cited by 198 (8 self)
- Add to MetaCart
Community networks a b s t r a c t Wireless technologies are rapidly evolving and the users are demanding the possibility of changing their point of attachment to the Internet (i.e. Access Routers) without breaking the IP communications. This can be achieved by using Mobile IP or NEMO. However
Subnet B Internet Router
"... There has been much interest in efficient IP-based micro-mobility management schemes for next-generation wireless networks. Such schemes are essential to achieve seamless integration of cellular networks with existing IP-based data networks. This article describes a lightweight intradomain mobility ..."
Abstract
- Add to MetaCart
management protocol (IDMP) for managing mobility within a domain, commonly known as micromobility management, for nextgeneration wireless networks. IDMP is modular and simple because it leverages existing protocols, such as Mobile IP or SIP as global mobility management, for locating roaming nodes. Unlike
Results 1 - 10
of
658