Mostrando 6 resultados de: 6
Filtros aplicados
Subtipo de publicación
Conference Object(6)
Publisher
DRCN 2014 - Proceedings, 10th International Conference on Design of Reliable Communication Networks(2)
2014 IEEE Global Communications Conference, GLOBECOM 2014(1)
2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016(1)
GLOBECOM - IEEE Global Telecommunications Conference(1)
Proceedings - International Conference on Computer Communications and Networks, ICCCN(1)
Área temáticas
Ciencias de la computación(4)
Programación informática, programas, datos, seguridad(2)
El proceso político(1)
Física aplicada(1)
Lingüística(1)
Improving TCP performance and reducing self-induced congestion with receive window modulation
Conference ObjectAbstract: We present a control module for software edge routers called Receive Window Modulation - RWM. Its maPalabras claves:Edge router, Rate limiting, Self-induced congestion, TCP flow controlAutores:Arcas-Abella O., Ciaccia F., Diego Montero, Milito R., Nemirovsky M., Romero I., Serral-Gracià R.Fuentes:googlescopusRoute leak detection using real-time analytics on local BGP information
Conference ObjectAbstract: A route leak can be defined as a security gap that occurs due to the infringement of the routing polPalabras claves:BGP, Inter-domain routing, Route leaks, securityAutores:Diego Montero, Masip-Bruin X., Ramirez W., Serral-Gracià R., Siddiqui M.S., Yannuzzi M.Fuentes:googlescopusRoute leak identification: A step toward making inter-domain routing more reliable
Conference ObjectAbstract: Route leaks are one of the anomalies of inter-domain routing that have the capacity to produce largePalabras claves:Autores:Diego Montero, Masip-Bruin X., Serral-Gracià R., Siddiqui M.S., Yannuzzi M.Fuentes:googlescopusNetwork coding-based protection scheme for elastic optical networks
Conference ObjectAbstract: Optical technologies are the foundations supporting the current telecommunication network backbonesPalabras claves:Elastic Optical Networks, Network Coding, Proactive ProtectionAutores:Diego Montero, Lopez V., Martinez A., Masip-Bruin X., Ramirez W., Yannuzzi M.Fuentes:googlescopusOffloading personal security applications to the Network Edge: A mobile user case scenario
Conference ObjectAbstract: This paper discusses some challenges that user mobility imposes over the user-centric protection modPalabras claves:fog computing, mobility, NFV, Offloading, SDN, security, VirtualizationAutores:D Montero, Diego Montero, Serral-Gracià R.Fuentes:googlerraaescopusSecuring the LISP map registration process
Conference ObjectAbstract: The motivation behind the Locator/Identifier Separation Protocol (LISP) has shifted over time from rPalabras claves:internet, LISP, Loc/ID split, routing, securityAutores:Diego Montero, Masip-Bruin X., Serral-Gracià R., Siddiqui M.S., Yannuzzi M.Fuentes:googlescopus