Sciweavers

972 search results - page 115 / 195
» Design and Protocol for Internet Accessible Mathematical Com...
Sort
View
PAM
2010
Springer
14 years 5 months ago
Yes, We LEDBAT: Playing with the New BitTorrent Congestion Control Algorithm
Since December 2008, the official BitTorrent client is using a new congestion-control protocol for data transfer, implemented at the application layer and built over UDP at the tr...
Dario Rossi, Claudio Testa, Silvio Valenti
DSN
2007
IEEE
14 years 4 months ago
The Case for FEC-Based Reliable Multicast in Wireless Mesh Networks
Many important applications in wireless mesh networks require reliable multicast communication. Previously, Forward Error Correction (FEC) techniques have been proved successful f...
Dimitrios Koutsonikolas, Y. Charlie Hu
WOSP
2005
ACM
14 years 3 months ago
Modeling the performance of a NAT/firewall network service for the IXP2400
The evolution towards IP-aware access networks creates the possibility (and, indeed, the desirability) of additional network services, like firewalling or NAT, integrated into th...
Tom Verdickt, Wim Van de Meerssche, Koert Vlaeminc...
ICC
2008
IEEE
159views Communications» more  ICC 2008»
14 years 4 months ago
A Performance Study of Mobile Handoff Delay in IEEE 802.11-Based Wireless Mesh Networks
— Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. One important component of realizing large-...
Akshay Mangalam Srivatsa, Jiang Xie
ISADS
1999
IEEE
14 years 2 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao