— TCP Reno versions are widely used in current network, however it has been actualized that their throughput deteriorates in high-speed network and wireless environments. To over...
In this work we revisit and formally study the notion of proxy cryptography. Intuitively, various proxy functions allow two cooperating parties F (the “FBI”) and P (the “pro...
In this paper, we present a performance evaluation of a wide-area cluster system based on a rewallenabled Globus metacomputing toolkit. In order to establish communication links ...
In this paper we investigate the burstiness of the Transmission Control Protocol (TCP) and its impact on a network of finite TCP connections. A detailed TCP and network model is d...
Peter Dimopoulos, Panlop Zeephongsekul, Zahir Tari
—An interesting feature of the 3G cellular networks is their ability to support multiple data rates. Though the performance of TCP over wireless networks has been well studied, t...