Sciweavers

785 search results - page 123 / 157
» Cache Behavior of Network Protocols
Sort
View
DSRT
2008
IEEE
14 years 2 months ago
Design of Application-Specific Incentives in P2P Networks
A rational P2P node may decide not to provide a particular resource or to provide it with degraded quality. If nodes are very likely to behave this way, or if the failure of an P2...
Andrew Roczniak, Abdulmotaleb El-Saddik, Ross Kouh...
INFOCOM
2007
IEEE
14 years 1 months ago
Congestion Control for Small Buffer High Speed Networks
— There is growing interest in designing high speed routers with small buffers that store only tens of packets. Recent studies suggest that TCP NewReno, with the addition of a pa...
Yu Gu, Donald F. Towsley, C. V. Hollot, Honggang Z...
JSAC
2010
88views more  JSAC 2010»
13 years 6 months ago
Modeling broadcasting using omnidirectional and directional antenna in delay tolerant networks as an epidemic dynamics
—We study broadcasting of information in a system of moving agents equipped with omnidirectional as well as directional antenna. The agent communication protocol is inspired by t...
Fernando Peruani, A. Maiti, Sanjib Sadhu, Hugues C...
IPPS
2006
IEEE
14 years 1 months ago
A simulation study of the effects of multi-path approaches in e-commerce applications
Response time is a key factor of any e-Commerce application, and a set of solutions have been proposed to provide low response time despite network congestions or failures. Being ...
Paolo Romano, Francesco Quaglia, Bruno Ciciani
CCS
2009
ACM
14 years 2 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...