Sciweavers

77 search results - page 12 / 16
» Characterizing Gnutella Network Properties for Peer-to-Peer ...
Sort
View
IM
2008
13 years 7 months ago
Directed Random Dot Product Graphs
In this paper we consider three models for random graphs that utilize the inner product as their fundamental object. We analyze the behavior of these models with respect to cluster...
Stephen J. Young, Edward R. Scheinerman
IPSN
2005
Springer
14 years 28 days ago
A family of distributed space-time trellis codes with asynchronous cooperative diversity
—In current cooperative communication schemes, to achieve cooperative diversity, synchronization between terminals is usually assumed, which may not be practical since each termi...
Yabo Li, Xiang-Gen Xia
ICCS
2007
Springer
14 years 1 months ago
Detecting Invisible Relevant Persons in a Homogeneous Social Network
Abstract. An algorithm to detect invisible relevant persons in a homogeneous social network is studied with computer simulation. The network is effective as a model for contempora...
Yoshiharu Maeno, Kiichi Ito, Yukio Ohsawa
ICNP
2003
IEEE
14 years 21 days ago
Improving TCP Startup Performance Using Active Measurements: Algorithm and Evaluation
TCP Slow Start exponentially increases the congestion window size to detect the proper congestion window for a network path. This often results in significant packet loss, while ...
Ningning Hu, Peter Steenkiste
IWDC
2001
Springer
101views Communications» more  IWDC 2001»
13 years 12 months ago
Resource Stealing in Endpoint Controlled Multi-class Networks
Abstract. Endpoint admission control is a mechanism for achieving scalable services by pushing quality-of-service functionality to end hosts. In particular, hosts probe the network...
Susana Sargento, Rui Valadas, Edward W. Knightly