Sciweavers

1551 search results - page 246 / 311
» Privacy-Preserving Network Aggregation
Sort
View
ICNP
2000
IEEE
14 years 1 months ago
SCalable Object-tracking through Unattended Techniques (SCOUT)
A scalable object location service can enable users to search for various objects in an environment where many small, networked devices are attached to objects. We investigate two...
Satish Kumar, Cengiz Alaettinoglu, Deborah Estrin
INFOCOM
2000
IEEE
14 years 1 months ago
End-to-End Congestion Control Schemes: Utility Functions, Random Losses and ECN Marks
We present a framework for designing end-to-end congestion control schemes in a network where each user may have a different utility function and may experience non-congestion-re...
Srisankar S. Kunniyur, Rayadurgam Srikant
INFOCOM
2000
IEEE
14 years 1 months ago
The Chaotic Nature of TCP Congestion Control
— In this paper we demonstrate how TCP congestion control can show chaotic behavior. We demonstrate the major features of chaotic systems in TCP/IP networks with examples. These ...
Andras Veres, Miklós Boda
INFOCOM
1998
IEEE
14 years 1 months ago
On Statistical Multiplexing, Traffic Mixes, and VP Management
ATM-based integrated services networks are likely to rely on the Virtaal Path (VP) concept as an intermediate resource management layer wherein key decisions concerning resource a...
Ching-Fong Su, Gustavo de Veciana
ICDCS
1996
IEEE
14 years 1 months ago
Route Optimization and Location Updates for Mobile Hosts
Mobile hosts in a wireless network can move from one location to another while communicating with other hosts. A challenge is to provide seamless network access for mobile hosts a...
Weidong Chen, Eric C. Lin