Sciweavers

6652 search results - page 184 / 1331
» On the effective evaluation of TCP
Sort
View
ICNP
2007
IEEE
14 years 3 months ago
Routing amid Colluding Attackers
Abstract— We propose the first practical solution to the longstanding problem of secure wireless routing in the presence of colluding attackers. Our secure routing protocol, Spr...
Jakob Eriksson, Michalis Faloutsos, Srikanth V. Kr...
SIGCOMM
1999
ACM
14 years 1 months ago
An Integrated Congestion Management Architecture for Internet Hosts
This paper presents a novel framework for managing network congestion from an end-to-end perspective. Our work is motivated by several trends in traffic patterns that threaten th...
Hari Balakrishnan, Hariharan Shankar Rahul, Sriniv...
CN
2004
142views more  CN 2004»
13 years 9 months ago
Adaptive video streaming: pre-encoded MPEG-4 with bandwidth scaling
The increasing popularity of streaming video is a cause for concern for the stability of the Internet because most streaming video content is currently delivered via UDP, without ...
Alex Balk, Mario Gerla, Dario Maggiorini, M. Y. Sa...
COMCOM
2004
90views more  COMCOM 2004»
13 years 9 months ago
Understanding bandwidth-delay product in mobile ad hoc networks
Bandwidth-delay product (BDP) and its upper bound (BDP-UB) have been well-understood in wireline networks such as the Internet. However, they have not been carefully studied in th...
Kai Chen, Yuan Xue, Samarth H. Shah, Klara Nahrste...
CN
2000
114views more  CN 2000»
13 years 9 months ago
Improving goodputs of IP packets under ATM UBR traffic with port-based queueing schemes
ATM networks are widely adopted as backbone networks. TCP/IP are the most popular protocols today and it is quite possible that packets are forwarded by ATM networks. In ATM netwo...
Wei Kuang Lai, Mu-Rung Shiu