Zobrazeno 1 - 10
of 41
pro vyhledávání: '"Börje Ohlman"'
Autor:
Christian Esteve Rothenberg, Sabine Randriamasy, Danny Lachos, Luis M. Contreras, Börje Ohlman, Qiao Xiang
Publikováno v:
NAI@SIGCOMM
The collaboration between networks and applications provides opportunities to both applications to improve their performances and network service providers to increase business offering. Although many systems are proposed to support such collaboratio
Autor:
Sabine Randriamasy, Luis M. Contreras, Christian Esteve Rothenberg, Börje Ohlman, Kai Gao, Danny Lachos, Y. Richard Yang, Qiao Xiang
Publikováno v:
ANRW
Multi-domain applications can benefit from network information exposure using the ALTO protocol framework. ALTO provides network state and capabilities to applications to be more flexible in terms of rate adaptation, transmission time, and server/pat
Autor:
Ersin Uzun, Gene Tsudik, Edith C.-H. Ngai, Matthias Wählisch, Börje Ohlman, Christopher A. Wood
Publikováno v:
ACM SIGCOMM Computer Communication Review. 47:49-54
In recent years, Information-centric Networking (ICN) has received much attention from both academic and industry participants. ICN offers data-centric inter-networking that is radically different from today's host-based IP networks. Security and pri
Autor:
Börje Ohlman, Danny Lachos, Farni Boten, Sabine Randriamasy, Qiao Xiang, Luis M. Contreras, Christian Esteve Rothenberg, Y. Richard Yang
Publikováno v:
ANRW
Many multi-domain use cases can benefit substantially from network information exposure, but also introduce new, key requirements that existing exposure solutions, such as the Application-Layer Traffic Optimization (ALTO) protocol, do not satisfy. In
Publikováno v:
ICIN
Maintaining communication and information sharing in a disaster situation is a challenging task. A typical consequence of a natural disaster is that communication networks get fragmented. Consequently, information published in one fragment is no long
Publikováno v:
GIoTS
Attribute-Based Encryption (ABE) is considered to be one of the most promising ways to be enforce access control in Information-Centric Networking (ICN). As the Internet of Things (IoT) is being considered as one of the primary use cases for ICN it r
Autor:
Christian Dannewitz, Dirk Kutscher, Bengt Ahlgren, Holger Karl, Stephen Farrell, Börje Ohlman
Publikováno v:
Computer Communications
Information-centric networking (ICN) is a promising approach to networking that has the potential to provide better - more natural and more efficient - solutions for many of today's important communication applications including but not limited to la
Publikováno v:
Proceedings of the 2016 conference on 3rd ACM Conference on Information-Centric Networking-ACM-ICN 16
Proceedings of the 2016 conference on 3rd ACM Conference on Information-Centric Networking-ACM-ICN '16
Proceedings of the 3rd ACM Conference on Information-Centric Networking
ICN
Proceedings of the 2016 conference on 3rd ACM Conference on Information-Centric Networking-ACM-ICN '16
Proceedings of the 3rd ACM Conference on Information-Centric Networking
ICN
The Information-Centric Networking (ICN) paradigm is drastically different from traditional host-centric IP networking. As a consequence of the disparity between the two, the security models are also very different. The security model for IP is based
Publikováno v:
IEEE Communications Magazine. 50:26-36
The information-centric networking (ICN) concept is a significant common approach of several future Internet research activities. The approach leverages in-network caching, multiparty communication through replication, and interaction models decoupli
Publikováno v:
LCN
In the current IP networks, content replication and inter-domain Traffic Engineering (TE) are manipulated by different entities with respective objectives, and work at different layers as well. In Information-Centric Networking (ICN), however, they c