Sciweavers

7587 search results - page 1311 / 1518
» Network Analysis and Visualisation
Sort
View
INFOCOM
2008
IEEE
14 years 3 months ago
Proxy Caching in Split TCP: Dynamics, Stability and Tail Asymptotics
Abstract—The split of a multihop, point to point TCP connection consists in replacing a plain, end-to-end TCP connection by a cascade of TCP connections. In such a cascade, conne...
François Baccelli, Giovanna Carofiglio, Ser...
NDSS
2008
IEEE
14 years 3 months ago
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
We study and document an important development in how attackers are using Internet resources: the creation of malicious DNS resolution paths. In this growing form of attack, victi...
David Dagon, Niels Provos, Christopher P. Lee, Wen...
ICC
2007
IEEE
139views Communications» more  ICC 2007»
14 years 3 months ago
Impatient Backoff Algorithm: Fairness in a Distributed Ad-Hoc MAC
— Many distributed multiple access (MAC) protocols use an exponential backoff mechanism. In that mechanism, a node picks a random backoff time uniformly in an interval that doubl...
Rajarshi Gupta, Jean C. Walrand
INFOCOM
2007
IEEE
14 years 3 months ago
Feedforward SDL Constructions of Output-Buffered Multiplexers and Switches with Variable Length Bursts
Abstract— In this paper, we study the problem of exact emulation of two types of optical queues: (i) N-to-1 output-buffered multiplexers with variable length bursts, and (ii) N Ã...
Yi-Ting Chen, Cheng-Shang Chang, Jay Cheng, Duan-S...
INFOCOM
2007
IEEE
14 years 3 months ago
Achievable Capacity Under the Interference Temperature Model
— The Interference Temperature Model was proposed by the FCC in 2003 as a way to dynamically manage and allocate spectrum resources. It would allow unlicensed radios to sense the...
Thomas C. Clancy
« Prev « First page 1311 / 1518 Last » Next »