A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is application/pdf
.
Filters
Architecture and protocols for the Internet of Things: A case study
2010
2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
In this paper, we describe a practical realization of an Internet-of-Things (IoT) architecture at the University of Padova, Italy. ...
A support for the 6LoWPAN standard makes nodes reachable from outside the network using IPv6 and provides an infrastructure to realize IoT applications. ...
In order to realize the Internet of Things, the simple, efficient way of realizing the REST architecture presented in this paper is surely needed as a global standard. ...
doi:10.1109/percomw.2010.5470520
dblp:conf/percom/CastellaniBCRSZ10
fatcat:4serxgfncbhnjlacfoyfk7wmzm
The design philosophy of the DARPA internet protocols
1988
Symposium proceedings on Communications architectures and protocols - SIGCOMM '88
Implementors tried such things as moving the transport protocols to a front end processor, with the idea that the protocols would be implemented only once, rather than again for every type of host. ...
For example, the Internet protocol is based on a connectionless or datagram mode of service. The motivation for this has been greatly misunderstood. ...
doi:10.1145/52324.52336
dblp:conf/sigcomm/Clark88
fatcat:ws6q2lc2d5bg3hggkgqirdsxom
Greening of the internet
2003
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '03
Using sample packet traces, we first show that it is indeed reasonable to do this and then we discuss the changes that may need to be made to current Internet protocols to support a more aggressive strategy ...
We discuss the impact on network protocols of saving energy by putting network interfaces and other router & switch components to sleep. ...
David also provided the idea of using wireless energy costs as a point of comparison. The authors would also like to thank David Burns for assisting us in data collection. ...
doi:10.1145/863955.863959
dblp:conf/sigcomm/GuptaS03
fatcat:c2ydhpwkifaihfz72dwqhngjl4
Greening of the internet
2003
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '03
Using sample packet traces, we first show that it is indeed reasonable to do this and then we discuss the changes that may need to be made to current Internet protocols to support a more aggressive strategy ...
We discuss the impact on network protocols of saving energy by putting network interfaces and other router & switch components to sleep. ...
David also provided the idea of using wireless energy costs as a point of comparison. The authors would also like to thank David Burns for assisting us in data collection. ...
doi:10.1145/863956.863959
fatcat:37xm53hezbh7boxpb4e6pcw7d4
Using pathchar to estimate Internet link characteristics
1999
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication - SIGCOMM '99
, the SIGMETRICS reviewers and program committee, the SIGCOMM reviewers and program committee, and Van Jacobson for writing pathchar. ...
Acknowledgements Many thanks to k claffy at CAIDA, Jason Lavoie at MINT, Greg Miller at MCI, Evi Nemeth and Daniel McRobb at CAIDA, Rich Wolski at the University of Tennessee, Mark Crovella at Boston University ...
Our example paths, and the 11 links that comprise them, are not intended to be a statistical sample of the Internet (cf. Psxson's empirical studies [3, 41) . ...
doi:10.1145/316188.316228
dblp:conf/sigcomm/Downey99
fatcat:mrz266ltpbbkdf2e74lbvzr2ue
A study of prefix hijacking and interception in the internet
2007
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '07
This paper presents a study of such prefix hijacking and interception with the following contributions: (1). We present a methodology for prefix interception, (2). ...
We estimate the fraction of traffic to any prefix that can be hijacked and intercepted in the Internet today, (3). ...
F49620-02-1-0233 and PA8750-05-C-0268 and by a grant from Intel. ...
doi:10.1145/1282380.1282411
dblp:conf/sigcomm/BallaniFZ07
fatcat:ykex24bnmfcepnyhdmxv43aomm
A knowledge plane for the internet
2003
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '03
and advice to other elements of the network. ...
Instead, we propose a new construct, the Knowledge Plane, a pervasive system within the network that builds and maintains highlevel models of what the network is supposed to do, in order to provide services ...
The authors thank the SIGCOMM reviewers and the many participants in the DARPA Knowledge Plane Study for discussions and comments that have contributed greatly to the development of our perspective. ...
doi:10.1145/863955.863957
dblp:conf/sigcomm/ClarkPRW03
fatcat:zzia3rvsvzff7pfy34cvlmj3a4
The end-to-end effects of Internet path selection
1999
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication - SIGCOMM '99
The path taken by a packet traveling across the Internet depends on a large number of factors, including routing protocols and pernetwork routing policies. ...
We find that in 30-80% of the cases, there is an alternate path with significantly superior quality. We argue that the overall result is robust and we explore two hypotheses for explaining it. ...
Varadhan et al. present a simulation study of the effect of path changes on the performance of transport protocols [VEF98] ...
doi:10.1145/316188.316233
dblp:conf/sigcomm/SavageCHSA99
fatcat:67m2gw5sobbe7hilmxcr54ye2i
A knowledge plane for the internet
2003
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '03
and advice to other elements of the network. ...
Instead, we propose a new construct, the Knowledge Plane, a pervasive system within the network that builds and maintains highlevel models of what the network is supposed to do, in order to provide services ...
The authors thank the SIGCOMM reviewers and the many participants in the DARPA Knowledge Plane Study for discussions and comments that have contributed greatly to the development of our perspective. ...
doi:10.1145/863956.863957
fatcat:rs2yvginw5hrplfgzknnr4ryi4
On selfish routing in internet-like environments
2003
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '03
In this paper, we use a game-theoretic approach to investigate the performance of selfish routing in Internet-like environments based on realistic topologies and traffic demands in our simulations. ...
Moreover, the adaptive nature of selfish overlays can significantly reduce the effectiveness of traffic engineering by making network traffic less predictable. ...
Zegura, and the anonymous reviewers. ...
doi:10.1145/863955.863974
dblp:conf/sigcomm/QiuYZS03
fatcat:il7qi2knwzbjlj5my4nrc6tx4y
On selfish routing in internet-like environments
2003
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '03
In this paper, we use a game-theoretic approach to investigate the performance of selfish routing in Internet-like environments based on realistic topologies and traffic demands in our simulations. ...
Moreover, the adaptive nature of selfish overlays can significantly reduce the effectiveness of traffic engineering by making network traffic less predictable. ...
Zegura, and the anonymous reviewers. ...
doi:10.1145/863973.863974
fatcat:yfcsyfel6neqpow3twjp2lp6ze
Can internet video-on-demand be profitable?
2007
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '07
Video-on-demand in the Internet has become an immensely popular service in recent years. But due to its high bandwidth requirements and popularity, it is also a costly service to provide. ...
We consider the design and potential benefits of peer-assisted video-on-demand, in which participating peers assist the server in delivering VoD content. ...
REAL-WORLD CASE STUDY The previous section presented a theoretical model that exposed many of the fundamental issues of peer-assisted VoD. ...
doi:10.1145/1282380.1282396
dblp:conf/sigcomm/HuangLR07
fatcat:qv4lo2dv5bhlxclqte4evhjumm
Thinging-Based Conceptual Modeling: Case Study of a Tendering System
[article]
2020
arXiv
pre-print
may enhance and facilitate a supplementary understanding of the OO model itself. ...
We apply a recently developed model called the Thinging Machine (TM) model which uniformly integrates static and dynamic modeling features to this problem of requirements specification. ...
Ethics This article is original and contains unpublished material. The corresponding author confirms that all of the other authors have read and approved the manuscript. ...
arXiv:2007.00168v1
fatcat:tybuu76ytngy3egapc6zjjztye
Session directories and scalable Internet multicast address allocation
1998
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication - SIGCOMM '98
Despite our best efforts to make such an approach scale, this analysis ultimately reveals significant scaling problems, and suggests a new approach to multicast address allocation in the Internet environment ...
A multicast session directory is a mechanism by which users can discover the existence of multicast sessions. ...
Figure 15 : 15 Simulations
Figure 16 : 16 Delay in a Multicast Request-Response Protocol model of the real internet. ...
doi:10.1145/285237.285269
dblp:conf/sigcomm/Handley98
fatcat:3q4mq7nj3zas7ju5nxnhgggsxe
Securing internet coordinate embedding systems
2007
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '07
This paper addresses the issue of the security of Internet Coordinate Systems, by proposing a general method for malicious behavior detection during coordinate computations. ...
A combination of simulations and Planet-Lab experiments are used to demonstrate the validity, generality, and effectiveness of the proposed approach for two representative coordinate embedding systems, ...
Acknowledgments We would like to thank Dina Papagiannaki, Guy Leduc and the anonymous reviewers for their useful comments that helped improve the paper. ...
doi:10.1145/1282380.1282388
dblp:conf/sigcomm/KaafarMBSTD07
fatcat:5prbgms35ncbdalaf5er5vohiq
« Previous
Showing results 1 — 15 out of 53,287 results