Sciweavers

5324 search results - page 742 / 1065
» Internet Security Protocols
Sort
View
PAM
2010
Springer
14 years 5 months ago
Yes, We LEDBAT: Playing with the New BitTorrent Congestion Control Algorithm
Since December 2008, the official BitTorrent client is using a new congestion-control protocol for data transfer, implemented at the application layer and built over UDP at the tr...
Dario Rossi, Claudio Testa, Silvio Valenti
HICSS
2009
IEEE
116views Biometrics» more  HICSS 2009»
14 years 5 months ago
Systems Modeling for IP-Based Handoff Using Timed Petri Nets
The mechanisms and design principles needed for achieving optimized handoff for mobile Internet services are poorly understood and need better analysis. This paper contributes to ...
Ashutosh Dutta, Bryan Lyles, Henning Schulzrinne, ...
CANDC
2009
ACM
14 years 5 months ago
BodyDaemon
This paper introduces the idea of actualizing theory in the context of artistic practice. We describe the project BodyDaemon and its function as a technology-based artwork that is...
Carlos Castellanos, Thecla Schiphorst
SIGCOMM
2009
ACM
14 years 5 months ago
Pathlet routing
Source-controlled multipath routing can be highly beneficial to both sources and to network providers. For a source, the flexibility to choose among multiple paths can improve r...
Brighten Godfrey, Igor Ganichev, Scott Shenker, Io...
DSN
2007
IEEE
14 years 5 months ago
The Case for FEC-Based Reliable Multicast in Wireless Mesh Networks
Many important applications in wireless mesh networks require reliable multicast communication. Previously, Forward Error Correction (FEC) techniques have been proved successful f...
Dimitrios Koutsonikolas, Y. Charlie Hu