The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
In the Internet today, traffic management spans congestion control (at end hosts), routing protocols (on routers), and traffic engineering (by network operators). Historically, th...
Jiayue He, Martin Suchara, Ma'ayan Bresler, Jennif...
In this paper we describe an analytical technique for the performance evaluation of wide-area networks carrying realistic TCP traffic, such as that produced by a large number of f...
System administrators of today’s high performance computing systems are generally responsible for managing the large amounts of data traffic and archival querying that mass stor...
Mobile Ad hoc NETworks (MANETs) provide a lot of promise for many practical applications. However, MANETs are vulnerable to a number of attacks due to its autonomous nature. DoS/D...