• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,951
Next 10 →

NETWORK RESILIENCY

by Michael Tortorella , 2010
"... “Network resiliency” has been used in common language for many years in a variety of contexts. The intent of the usage seems to always have included the notions that a resilient network is one that continues to deliver services in a satisfactory fashion despite possible disruptions in the network ..."
Abstract - Add to MetaCart
“Network resiliency” has been used in common language for many years in a variety of contexts. The intent of the usage seems to always have included the notions that a resilient network is one that continues to deliver services in a satisfactory fashion despite possible disruptions in the network

Network resiliency

by Part Survivability, Marc De Leenheer, Prof Biswanath Mukherjee, R Pk Xrk
"... 99,9 % 8 hours, 45 minutes 99,99 % 52 minutes, 33 seconds 99,999 % 5 minutes, 15 seconds cl = c max l = Erl 1(⇢max, B) ..."
Abstract - Add to MetaCart
99,9 % 8 hours, 45 minutes 99,99 % 52 minutes, 33 seconds 99,999 % 5 minutes, 15 seconds cl = c max l = Erl 1(⇢max, B)

Percolation processes and wireless network resilience

by Zhenning Kong, Zhenning Kong, Edmund M. Yeh - in Information Theory and Applications Workshop
"... Percolation processes and wireless network resilience ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Percolation processes and wireless network resilience

Resilient Overlay Networks

by David Andersen, Hari Balakrishnan, Frans Kaashoek, Robert Morris , 2001
"... A Resilient Overlay Network (RON) is an architecture that allows distributed Internet applications to detect and recover from path outages and periods of degraded performance within several seconds, improving over today’s wide-area routing protocols that take at least several minutes to recover. A R ..."
Abstract - Cited by 1160 (31 self) - Add to MetaCart
A Resilient Overlay Network (RON) is an architecture that allows distributed Internet applications to detect and recover from path outages and periods of degraded performance within several seconds, improving over today’s wide-area routing protocols that take at least several minutes to recover. A

Network Resilience Improvement Outline

by Mohammed J. F. Alenazi, Advisor James, P. G. Sterbenz , 2015
"... • Introduction and motivation • Background and related work • Graph models • Network design and improvement • Evaluation and improvement ..."
Abstract - Add to MetaCart
• Introduction and motivation • Background and related work • Graph models • Network design and improvement • Evaluation and improvement

A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks

by Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili , 2003
"... this paper, we provide a framework in which to study the security of key pre-distribution schemes, propose a new key pre-distribution scheme which substantially improves the resilience of the network compared to previous schemes, and give an in-depth analysis of our scheme in terms of network resili ..."
Abstract - Cited by 552 (18 self) - Add to MetaCart
this paper, we provide a framework in which to study the security of key pre-distribution schemes, propose a new key pre-distribution scheme which substantially improves the resilience of the network compared to previous schemes, and give an in-depth analysis of our scheme in terms of network

Tapestry: A Resilient Global-scale Overlay for Service Deployment

by Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, John D. Kubiatowicz - IEEE Journal on Selected Areas in Communications , 2004
"... We present Tapestry, a peer-to-peer overlay routing infrastructure offering efficient, scalable, locationindependent routing of messages directly to nearby copies of an object or service using only localized resources. Tapestry supports a generic Decentralized Object Location and Routing (DOLR) API ..."
Abstract - Cited by 598 (14 self) - Add to MetaCart
behavior and performance as an overlay, despite the instability of the underlying network layers. Several widely-distributed applications have been implemented on Tapestry, illustrating its utility as a deployment infrastructure.

How practical is network coding?

by Mea Wang, Baochun Li , 2006
"... With network coding, intermediate nodes between the source and the receivers of an end-to-end communication session are not only capable of relaying and replicating data messages, but also of coding incoming messages to produce coded outgoing ones. Recent studies have shown that network coding is ..."
Abstract - Cited by 1016 (23 self) - Add to MetaCart
is beneficial for peer-to-peer content distribution, since it eliminates the need for content reconciliation, and is highly resilient to peer failures. In this paper, we present our recent experiences with a highly optimized and high-performance C++ implementation of randomized network coding at the application

The Role of the Internet of Things in Network Resilience

by unknown authors
"... Abstract—Disasters lead to devastating structural damage not only to buildings and transport infrastructure, but also to other critical infrastructure, such as the power grid and communication backbones. Following such an event, the availability of minimal communication services is however crucial t ..."
Abstract - Add to MetaCart
of any infrastructure, using a spontaneous wireless network paradigm. In this paper, we argue that the vast deployment of IoT-enabled devices could bring benefits in terms of data network resilience in face of disaster. Leveraging their spontaneous wireless networking capabilities, IoT devices could

Random Key Predistribution Schemes for Sensor Networks”,

by Haowen Chan , Adrian Perrig , Dawn Song - IEEE Symposium on Security and Privacy, , 2003
"... Abstract Efficient key distribution is the basis for providing secure communication, a necessary requirement for many emerging sensor network applications. Many applications require authentic and secret communication among neighboring sensor nodes. However, establishing keys for secure communicatio ..."
Abstract - Cited by 832 (12 self) - Add to MetaCart
Abstract Efficient key distribution is the basis for providing secure communication, a necessary requirement for many emerging sensor network applications. Many applications require authentic and secret communication among neighboring sensor nodes. However, establishing keys for secure
Next 10 →
Results 1 - 10 of 3,951
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University