Routing table

Results: 318



#Item
121Routing protocols / OSI protocols / Computing / Wireless networking / Routing / Geographic routing / Distributed hash table / Distance-vector routing protocol / Flooding / Routing algorithms / Network architecture / Distributed data storage

Geographic Routing without Location Information Ananth Rao Sylvia Ratnasamy∗ Christos Papadimitriou Scott Shenker† Ion Stoica

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2004-08-20 14:52:11
122Distributed hash table / Routing / Pastry / Link-state routing protocol / Chord / Distributed computing / Peer-to-peer / Tapestry / IEEE 802.1aq / Distributed data storage / Computing / Network architecture

Group Therapy for Systems: Using link attestations to manage failures Michael J. Freedman, Ion Stoica, David Mazi`eres, and Scott Shenker New York University, U.C. Berkeley, and Stanford University Abstract

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2006-02-18 01:28:57
123OverSim / Network architecture / Distributed hash table / Routing / Pastry / Computer architecture / Chord / Distributed data storage / Computing / Peer-to-peer

PDF Document

Add to Reading List

Source URL: telematics.tm.kit.edu

Language: English - Date: 2012-06-29 09:28:11
124Electromagnetism / Computer network / Telecommunications engineering / Node / Distributed computing / Routing / Topology / Network topology / Distributed hash table / Distributed data storage / Electronics / Computing

A Position Statement: An Approach to Measuring Large-Scale Distributed Systems Jun Li, Peter Reiher, Gerald Popek {lijun, reiher, popek}@cs.ucla.edu University of California, Los Angeles

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2002-02-16 03:43:51
125Distributed computing / Chord / Distributed hash table / Peer-to-peer / Routing / Kademlia / BATON Overlay / Distributed data storage / Concurrent computing / Computing

A Peer-to-Peer Dictionary Using Chord DHT Siamak Sarmady School of Computer Sciences, Universiti Sains Malaysia, 11800 Penang, Malaysia {}

Add to Reading List

Source URL: www.sarmady.com

Language: English - Date: 2007-12-13 20:16:39
126Internet / Computer networking / Routing / Internet protocols / Routing table / Router / Border Gateway Protocol / Forwarding information base / Path vector protocol / Network architecture / Routing protocols / Computing

Securing Data Through Avoidance Routing Erik Kline Peter Reiher Laboratory for Advanced Systems Research

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2010-05-07 12:30:59
127Computer network security / Computer networking / Routing / Denial-of-service attacks / Denial-of-service attack / Anycast / Border Gateway Protocol / Router / Routing table / Network architecture / Internet / Computing

Shield: DoS Filtering Using Traffic Deflecting

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2012-01-17 14:57:22
128Distributed hash table / Chord / Internet / Peer-to-peer / Routing table / Routing / Sybil attack / PlanetLab / Kademlia / Distributed data storage / Computing / Network architecture

Wh¯anau: A Sybil-proof Distributed Hash Table Chris Lesniewski-Laas M. Frans Kaashoek MIT CSAIL, Cambridge, MA, USA {ctl,kaashoek}@mit.edu

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:18
129File sharing networks / Hashing / Peer-to-peer / Distributed hash table / Computing / Cryptography / Cryptographic hash function / Routing / Science / Distributed data storage / Reputation management / Sybil attack

Christopher T Lesniewski-Laas Updated March 2010 Contact Information

Add to Reading List

Source URL: lesniewski.org

Language: English - Date: 2010-03-13 22:43:23
130Routing / Internet protocols / Internet standards / Reverse path forwarding / Router / Forwarding information base / IP multicast / Routing table / Distance Vector Multicast Routing Protocol / Network architecture / Internet / Computing

SAVE: Source Address Validity Enforcement Protocol† Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter Reiher, and Lixia Zhang Computer Science Department University of California, Los Angeles AbstractForcing all IP packe

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2002-08-27 17:57:39
UPDATE