Sciweavers

237 search results - page 16 / 48
» Modeling TCP performance with proxies
Sort
View
TPDS
2010
194views more  TPDS 2010»
13 years 6 months ago
On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
—This paper analyzes the potential of cooperative proxy caching for peer-to-peer (P2P) traffic as a means to ease the burden imposed by P2P traffic on Internet Service Providers ...
Mohamed Hefeeda, Behrooz Noorizadeh
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
GLOBECOM
2006
IEEE
14 years 1 months ago
Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput
— At the forefront of the recent advances in mobile networks is the development of sophisticated mobility management mechanisms that are usually based on Mobile IP and its deriva...
Antonios Argyriou, Vijay K. Madisetti
KAIS
2002
95views more  KAIS 2002»
13 years 7 months ago
Enhanced Proxy Caching with Content Management
In this paper, we propose a novel approach to enhancing web proxy caching, an approach that integrates content management with performance tuning techniques. We first develop a hie...
Kai Cheng, Yahiko Kambayashi
SIGCOMM
2005
ACM
14 years 1 months ago
On the predictability of large transfer TCP throughput
Predicting the throughput of large TCP transfers is important for a broad class of applications. This paper focuses on the design, empirical evaluation, and analysis of TCP throug...
Qi He, Constantinos Dovrolis, Mostafa H. Ammar