Sciweavers

79 search results - page 7 / 16
» On the correspondency between TCP acknowledgment packet and ...
Sort
View
EUROSEC
2009
ACM
14 years 1 months ago
Application-based TCP hijacking
We present application-based TCP hijacking (ABTH), a new attack on TCP applications that exploits flaws due to the interplay between TCP and application protocols to inject data ...
Oliver Zheng, Jason Poon, Konstantin Beznosov
ICMCS
2005
IEEE
112views Multimedia» more  ICMCS 2005»
14 years 18 days ago
Proxy-based reference picture selection for real-time video transmission over mobile networks
We propose a framework for error robust real-time video transmission over wireless networks. In our approach, we cope with packet loss on the downlink by retransmitting lost packe...
Wei Tu, Eckehard G. Steinbach
ICNP
2000
IEEE
13 years 11 months ago
General AIMD Congestion Control
Instead of the increase-by-onedecrease-to-halfstrategy used in TCP Reno for congestion window adjustment, we consider the general case such that the increase value and decrease ra...
Yang Richard Yang, Simon S. Lam
USENIX
2008
13 years 9 months ago
Optimizing TCP Receive Performance
The performance of receive side TCP processing has traditionally been dominated by the cost of the `per-byte' operations, such as data copying and checksumming. We show that ...
Aravind Menon, Willy Zwaenepoel
SIGMETRICS
2009
ACM
140views Hardware» more  SIGMETRICS 2009»
14 years 1 months ago
Maximum likelihood estimation of the flow size distribution tail index from sampled packet data
In the context of network traffic analysis, we address the problem of estimating the tail index of flow (or more generally of any group) size distribution from the observation of...
Patrick Loiseau, Paulo Gonçalves, Sté...