Sciweavers

1209 search results - page 120 / 242
» Effective bandwidths with priorities
Sort
View
ICDCS
2009
IEEE
14 years 7 months ago
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
Chia-Wei Chang, Seungjoon Lee, B. Lin, Jia Wang
SIES
2009
IEEE
14 years 4 months ago
Programmable temporal isolation through variable-bandwidth servers
—We introduce variable-bandwidth servers (VBS) for scheduling and executing processes under programmable temporal isolation. A VBS is an extension of a constant-bandwidth server ...
Silviu S. Craciunas, Christoph M. Kirsch, Hannes P...
ICNS
2009
IEEE
14 years 4 months ago
Nozzilla: A Peer-to-Peer IPTV Distribution Service for an IMS-Based NGN
—During the last years next generation networks (NGNs) have gained attention, as an increasing number of network operators moved toward triple-play services: telephony, Internet ...
Alex Bikfalvi, Jaime García-Reinoso, Iv&aac...
DATE
2008
IEEE
69views Hardware» more  DATE 2008»
14 years 4 months ago
Time Properties of the BuST Protocol under the NPA Budget Allocation Scheme
Token passing is a channel access technique used in several communication networks. Among them, one of the most effective solution for supporting both real-time traffic (synchron...
Gianluca Franchino, Giorgio C. Buttazzo, Tullio Fa...
INFOCOM
2008
IEEE
14 years 4 months ago
Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh Networks
—Significant progress has been made in understanding the behavior of TCP and congestion-controlled traffic over multihop wireless networks. Despite these advances, however, no ...
Jingpu Shi, Omer Gurewitz, Vincenzo Mancuso, Josep...