Sciweavers

99 search results - page 17 / 20
» Modeling the throughput of TCP Vegas
Sort
View
ACMSE
2006
ACM
14 years 1 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin
ISCC
2003
IEEE
113views Communications» more  ISCC 2003»
14 years 25 days ago
Channel Sharing of Competing Flows in Ad Hoc Networks
This paper studies the fairness with which competing flows share the channel in ad hoc networks using collision avoidance protocols. It is shown that the required multihop coordi...
Yu Wang, J. J. Garcia-Luna-Aceves
IPPS
2008
IEEE
14 years 2 months ago
On performance bottleneck of anonymous communication networks
Although a significant amount of effort has been directed at discovering attacks against anonymity communication networks and developing countermeasures to those attacks, there i...
Ryan Pries, Wei Yu, Steve Graham, Xinwen Fu
QOFIS
2000
Springer
13 years 11 months ago
The Direct Adjustment Algorithm: A TCP-Friendly Adaptation Scheme
Many distributed multimedia applications have the ability to adapt to uctuations in the network conditions. By adjusting temporal and spatial quality to available bandwidth, or man...
Dorgham Sisalem, Henning Schulzrinne
USITS
2003
13 years 9 months ago
Anypoint: Extensible Transport Switching on the Edge
Anypoint is a new model for one-to-many communication with ensemble sites—aggregations of end nodes that appear to the external Internet as a unified site. Policies for routing...
Ken Yocum, Darrell C. Anderson, Jeffrey S. Chase, ...