Abstract—Peer-to-Peer (P2P) file sharing applications use multiple TCP connections between peers to transfer data. The aggressiveness and robustness of P2P technology remarkably...
The security gateways today are required not only to block unauthorized accesses by authenticating packet headers, but also by inspecting connection states to defend against malic...
This paper discusses an efficient design and implementation of control and multiplexing protocols H.245 and H.223, which is an important part of 3G324M protocol stack, for mobile w...
Path MTU Discovery (PMTUD) is widely believed to be unreliable because of firewalls that discard ICMP "Packet Too Big" messages. This paper measures PMTUD behaviour for ...
Background: The evaluation of statistical significance has become a critical process in identifying differentially expressed genes in microarray studies. Classical p-value adjustm...
Nitin Jain, HyungJun Cho, Michael O'Connell, Jae K...