Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,944,449 papers from all fields of science
Search
Sign In
Create Free Account
Routing
Known as:
External gateway protocol
, Network routing method
, Routing information
Expand
Routing is the process of selecting best paths in a network. Routing is performed for many kinds of networks, including the public switched telephone…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Artificial ants
Bridging (networking)
Chernoff bound
Constraint graph (layout)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
A Study on Wormhole Attacks in MANET
Reshmi Maulik
,
N. Chaki
2011
Corpus ID: 15026022
An Ad-hoc network is a self-organized network, without a central coordinator, and which frequently changes its topology. In this…
Expand
2011
2011
Thermo-optic microring resonator switching elements made of dielectric-loaded plasmonic waveguides
O. Tsilipakos
,
E. Kriezis
,
S. Bozhevolnyi
2011
Corpus ID: 55147659
Thermo-optic switching elements made of dielectric-loaded plasmonic (DLSPP) waveguides are theoretically investigated by…
Expand
2005
2005
Distributed Hash Tables
Klaus Wehrle
,
S. Götz
,
S. Rieche
Peer-to-Peer Systems and Applications
2005
Corpus ID: 5261179
In the last few years, an increasing number of massively distributed systems with millions of participants has emerged within…
Expand
2003
2003
Network-on-chip modeling for system-level multiprocessor simulation
J. Madsen
,
S. Mahadevan
,
K. Virk
,
M. Gonzalez
RTSS . 24th IEEE Real-Time Systems Symposium,
2003
Corpus ID: 206525025
With the increasing number of transistors available on a single chip, the system-on-chip (SoC) paradigm has evolved to exploit…
Expand
Highly Cited
2002
Highly Cited
2002
Prevention of denial of service attacks and selfishness in mobile ad hoc networks
Pietro Michiardi
2002
Corpus ID: 16734073
Countermeasures against denial of service attacks and node misbehaviour are mandatory requirements in MANET. Essential network…
Expand
Highly Cited
2001
Highly Cited
2001
Scalable Web server cluster design with workload-aware request distribution strategy WARD
L. Cherkasova
,
M. Karlsson
Proceedings Third International Workshop on…
2001
Corpus ID: 10941306
We consider a Web cluster in which the content-aware distribution is performed by each of the nodes in a Web cluster. Each server…
Expand
2001
2001
Non-deterministic diagnosis of end-to-end service failures in a multi-layer communication system
M. Steinder
,
A. Sethi
Proceedings Tenth International Conference on…
2001
Corpus ID: 13436105
Fault localization is a process of isolating faults responsible for the observable malfunctioning of the managed system…
Expand
Review
2000
Review
2000
Algorithms for the Logical Topology Design in Wdm All-optical Networks
M. Mellia
2000
Corpus ID: 17478035
In this paper we discuss the optimal design of logical topologies in all-optical WDM networks. We rst explain the key aspects of…
Expand
1995
1995
A Petri Net Approach for the Performance Analysis of Business Processes
A. Schh
,
H. Rau
1995
Corpus ID: 15787128
Recently, many companies have realized that their organization needs to be improved in order to enhance exibility, eciency, and…
Expand
1994
1994
Unifying FPGAs and SIMD Arrays
Michael Bolotski
,
A. Dehon
,
Jr Thomas F. Knight
,
Jonathan Rose
1994
Corpus ID: 15068674
Field-Programmable Gate Arrays (FPGAs) and Single-Instruction Multiple-Data (SIMD) processing arrays share many architectural…
Expand