Sciweavers

6652 search results - page 29 / 1331
» On the effective evaluation of TCP
Sort
View
CONEXT
2006
ACM
13 years 11 months ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...
ICNP
1999
IEEE
13 years 12 months ago
A Behavioral Model of Web Traffic
The growing importance of Web traffic on the Internet makes it important that we have accurate traffic models in order to plan and provision. In this paper we present a Web traffi...
Hyoung-Kee Choi, John O. Limb
ICN
2007
Springer
14 years 1 months ago
Ring-Based Virtual Private Network Supporting a Large Number of VPNs
— In this paper, we propose a simple but effective VPN mechanism called RING-VPN (Ring-based Virtual Private Network) that realizes a high scalability in terms of the number of V...
Osamu Honda, Hiroyuki Ohsaki, Makoto Imase, Kazuhi...
MSWIM
2009
ACM
14 years 8 days ago
Modeling and performance evaluation of transmission control protocol over cognitive radio ad hoc networks
Cognitive Radio (CR) technology constitutes a new paradigm to provide additional spectrum utilization opportunities in wireless ad hoc networks. Recent research in this field has ...
Marco Di Felice, Kaushik Roy Chowdhury, Luciano Bo...
MOBICOM
1999
ACM
13 years 12 months ago
Analysis of TCP Performance over Mobile Ad Hoc Networks
Mobile ad hoc networks have attracted attention lately as a means of providing continuous network connectivity to mobile computing devices regardless of physical location. Recent r...
Gavin Holland, Nitin H. Vaidya