Sciweavers

TON
2016
61views more  TON 2016»
10 years 15 days ago
Discharging the Network From Its Flow Control Headaches: Packet Drops and HOL Blocking
Abstract—Congestion control becomes indispensable in highlyutilized consolidated networks running demanding applications. In this paper, proactive congestion management schemes f...
Nikolaos Chrysos, Lydia Y. Chen, Christoforos Kach...
TON
2016
61views more  TON 2016»
10 years 15 days ago
A Scalable and Resilient Layer-2 Network With Ethernet Compatibility
—We present the architecture and protocols of ROME, a layer-2 network designed to be backwards compatible with Ethernet and scalable to tens of thousands of switches and millions...
Chen Qian, Simon S. Lam
TON
2016
41views more  TON 2016»
10 years 15 days ago
Information Source Detection in the SIR Model: A Sample-Path-Based Approach
Abstract—This paper studies the problem of detecting the information source in a network in which the spread of information follows the popular Susceptible-Infected-Recovered (SI...
Kai Zhu, Lei Ying
TON
2016
57views more  TON 2016»
10 years 15 days ago
Exploiting Mobility in Proportional Fair Cellular Scheduling: Measurements and Algorithms
—Proportional Fair (PF) scheduling algorithms are the de-facto standard in cellular networks. They exploit the users’ channel state diversity (induced by fast-fading), and are ...
Robert Margolies, Ashwin Sridharan, Vaneet Aggarwa...
TON
2016
41views more  TON 2016»
10 years 15 days ago
On Distributed Virtual Network Embedding With Guarantees
—To provide wide-area network services, resources from different infrastructure providers are needed. Leveraging the consensus-based resource allocation literature, we propose a ...
Flavio Esposito, Donato Di Paola, Ibrahim Matta
100
Voted
TON
2016
45views more  TON 2016»
10 years 15 days ago
Optimal Placement for Barrier Coverage in Bistatic Radar Sensor Networks
Xiaowen Gong, Junshan Zhang, Douglas Cochran, Kai ...
TON
2016
51views more  TON 2016»
10 years 15 days ago
Perceptions and Truth: A Mechanism Design Approach to Crowd-Sourcing Reputation
—We consider a distributed multi-user system where individual entities possess observations or perceptions of one another, while the truth is only known to themselves and they mi...
Parinaz Naghizadeh, Mingyan Liu
TON
2016
44views more  TON 2016»
10 years 15 days ago
A Difference Resolution Approach to Compressing Access Control Lists
—Access Control Lists (ACLs) are the core of many networking and security devices. As new threats and vulnerabilities emerge, ACLs on routers and firewalls are getting larger. T...
James Daly, Alex X. Liu, Eric Torng
TON
2016
51views more  TON 2016»
10 years 15 days ago
Understanding RFID Counting Protocols
Counting the number of RFID tags, or RFID counting, is needed by a wide array of important wireless applications. Motivated by its paramount practical importance, researchers have...
Ziling Zhou, Binbin Chen, Haifeng Yu
TON
2016
46views more  TON 2016»
10 years 15 days ago
Migration Towards Cloud-Assisted Live Media Streaming
—Live media streaming has become one of the most popular applications over the Internet. We have witnessed the successful deployment of commercial systems with CDN- or peerto-pee...
Feng Wang, Jiangchuan Liu, Minghua Chen, Haiyang W...