Sciweavers

132 search results - page 16 / 27
» On the generation and use of TCP acknowledgments
Sort
View
CONEXT
2007
ACM
13 years 9 months ago
Promoting fluidity in the flow of packets of 802.11 wireless mesh networks
Wireless Mesh Networks (WMNs) are based on packet forwarding and therefore require efficient multi-hop protocols for their deployment. Toward this objective, we study the flow o...
Adel Aziz, Roger Karrer, Patrick Thiran
WWIC
2004
Springer
123views Communications» more  WWIC 2004»
14 years 1 months ago
Experimental Analysis of Heterogeneous Wireless Networks
Packet loss and delay in Internet degrade the quality of requested services like VoIP (Voice over IP) or Video Streaming. In novel network scenarios where wired and wireless connec...
Giulio Iannello, Antonio Pescapè, Giorgio V...
NIPS
1996
13 years 9 months ago
Probabilistic Interpretation of Population Codes
We present a general encoding-decoding framework for interpreting the activity of a population of units. A standard population code interpretation method, the Poisson model, start...
Richard S. Zemel, Peter Dayan, Alexandre Pouget
WWW
2007
ACM
14 years 8 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
CHI
2009
ACM
14 years 8 months ago
Exploring video streams using slit-tear visualizations
Slit-tear visualizations allow users to selectively visualize pixel paths in a video scene. The slit-tear visualization technique is a generalization of the traditional photograph...
Anthony Tang, Saul Greenberg, Sidney Fels