• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 658
Next 10 →

Tor: The secondgeneration onion router,”

by Roger Dingledine - in 13th USENIX Security Symposium. Usenix, , 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract - Cited by 1229 (33 self) - Add to MetaCart
, and a practical design for location-hidden services via rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability

Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination

by Shelley Q. Zhuang, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz, John D. Kubiatowicz , 2001
"... The demand for streaming multimedia applications is growing at an incredible rate. In this paper, we propose Bayeux, an efficient application-level multicast system that scales to arbitrarily large receiver groups while tolerating failures in routers and network links. Bayeux also includes specific ..."
Abstract - Cited by 465 (12 self) - Add to MetaCart
The demand for streaming multimedia applications is growing at an incredible rate. In this paper, we propose Bayeux, an efficient application-level multicast system that scales to arbitrarily large receiver groups while tolerating failures in routers and network links. Bayeux also includes specific

On Optimal Location of Switches/Routers and Interconnection

by Z. Liu, Y. Gu, Liu Gu Medhi , 1998
"... We address the computer communication network design problem of optimal location of switches/ routers as well as interconnection (OLSRI) of the core network. This problem is applicable, for example, in the network topological architecture design arising in ATM PNNI environment or IP/ATM networking e ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
We address the computer communication network design problem of optimal location of switches/ routers as well as interconnection (OLSRI) of the core network. This problem is applicable, for example, in the network topological architecture design arising in ATM PNNI environment or IP/ATM networking

Locating Internet Routing Instabilities

by Anja Feldmann , Olaf Maennel, Z. Morley Mao, Arthur Berger , Bruce Maggs - SIGCOMM'04 , 2004
"... This paper presents a methodology for identifying the autonomous system (or systems) responsible when a routing change is observed and propagated by BGP. The origin of such a routing instability is deduced by examining and correlating BGP updates for many prefixes gathered at many observation points ..."
Abstract - Cited by 142 (9 self) - Add to MetaCart
policies that are compatible with inferred peering /customer/provider relationships. In these simulations, in which network and router behavior are "ideal", we inject inter-AS link failures and demonstrate that our methodology can effectively identify most origins of instability. We then develop

Detecting SYN Flooding Attacks

by Haining Wang, Danlu Zhang, Kang G. Shin - In Proceedings of the IEEE Infocom , 2002
"... We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a victim server itself, we detect the SYN flooding attacks at leaf routers that connect end hosts to the Internet. The simplicity of our ..."
Abstract - Cited by 215 (8 self) - Add to MetaCart
We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a victim server itself, we detect the SYN flooding attacks at leaf routers that connect end hosts to the Internet. The simplicity

MetaRouter: bioinformatics for bioremediation

by Florencio Pazos, David Guijas, Alfonso Valencia, Victor De Lorenzo - Nucleic Acids Res , 2005
"... Bioremediation, the exploitation of biological catalysts (mostly microorganisms) for removing pollutants from the environment, requires the integration of huge amounts of data from different sources. We have developed MetaRouter, a system for maintaining heterogeneous information related to bioremed ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
Bioremediation, the exploitation of biological catalysts (mostly microorganisms) for removing pollutants from the environment, requires the integration of huge amounts of data from different sources. We have developed MetaRouter, a system for maintaining heterogeneous information related

Distributed router architecture for packet-routed optical networks

by Michael Düser, Eugene Kozlovski, Robert I. Killey, Polina Bayvel - PROC. FOURTH WORKING CONFERENCE ON OPTICAL NETWORK DESIGN AND MODELLING (ONDM 2000 , 2000
"... A new proposal for an optical packet-routed network based on a distributed router architecture in a WDM network is described. Buffering, scheduling and wavelength assignment functions are carried out in routers located at the edge of the network. The destination address is encoded by a given wavelen ..."
Abstract - Add to MetaCart
A new proposal for an optical packet-routed network based on a distributed router architecture in a WDM network is described. Buffering, scheduling and wavelength assignment functions are carried out in routers located at the edge of the network. The destination address is encoded by a given

Stored Program Routers

by Christian F. Tschudin , 2000
"... In this paper we present an abstract execution model for active networking that blends the notions of universal computing device and network router. Pivotal element of this architecture is a generalized route table that stores forwarding data as well as program instructions. The route table correspo ..."
Abstract - Add to MetaCart
In this paper we present an abstract execution model for active networking that blends the notions of universal computing device and network router. Pivotal element of this architecture is a generalized route table that stores forwarding data as well as program instructions. The route table

Route Optimization

by Ruben Cuevas B, Albert Cabellos-aparicio A, Angel Cuevas B, Jordi Domingo-pascual A, Arturo Azcorra B C - in Mobile IP", Work in Progress , 2001
"... Community networks a b s t r a c t Wireless technologies are rapidly evolving and the users are demanding the possibility of changing their point of attachment to the Internet (i.e. Access Routers) without breaking the IP communications. This can be achieved by using Mobile IP or NEMO. However, mobi ..."
Abstract - Cited by 198 (8 self) - Add to MetaCart
Community networks a b s t r a c t Wireless technologies are rapidly evolving and the users are demanding the possibility of changing their point of attachment to the Internet (i.e. Access Routers) without breaking the IP communications. This can be achieved by using Mobile IP or NEMO. However

Subnet B Internet Router

by Subir Das, Anthony Mcauley, Ashutosh Dutta, Telcordia Technologies Inc, Sa Sa
"... There has been much interest in efficient IP-based micro-mobility management schemes for next-generation wireless networks. Such schemes are essential to achieve seamless integration of cellular networks with existing IP-based data networks. This article describes a lightweight intradomain mobility ..."
Abstract - Add to MetaCart
management protocol (IDMP) for managing mobility within a domain, commonly known as micromobility management, for nextgeneration wireless networks. IDMP is modular and simple because it leverages existing protocols, such as Mobile IP or SIP as global mobility management, for locating roaming nodes. Unlike
Next 10 →
Results 1 - 10 of 658
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University