Sciweavers

3972 search results - page 68 / 795
» Design of the iSCSI Protocol
Sort
View
CN
2010
134views more  CN 2010»
13 years 7 months ago
TCP Libra: Derivation, analysis, and comparison with other RTT-fair TCPs
— The Transmission Control Protocol (TCP), the most widely used transport protocol over the Internet, has been advertised to implement fairness between flows competing for the s...
Gustavo Marfia, Claudio E. Palazzi, Giovanni Pau, ...
IAJIT
2010
87views more  IAJIT 2010»
13 years 7 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...
FORTE
2011
13 years 15 days ago
Analyzing BGP Instances in Maude
Analyzing Border Gateway Protocol (BGP) instances is a crucial step in the design and implementation of safe BGP systems. Today, the analysis is a manual and tedious process. Resea...
Anduo Wang, Carolyn L. Talcott, Limin Jia, Boon Th...
ICUIMC
2011
ACM
13 years 14 days ago
Overhead analysis of query localization optimization and routing
Query localization is an improved extension of on-demand routing protocols for ad hoc networks. It makes use of prior routing histories to localize the query flood to a limited re...
Wenzheng Xu, Yongmin Zhang, Weifa Liang
RTAS
2011
IEEE
12 years 12 months ago
Resource Sharing in GPU-Accelerated Windowing Systems
Recent windowing systems allow graphics applications to directly access the graphics processing unit (GPU) for fast rendering. However, application tasks that render frames on the...
Shinpei Kato, Karthik Lakshmanan, Yutaka Ishikawa,...