Sciweavers

2682 search results - page 178 / 537
» TCP rate control
Sort
View
129
Voted
VRML
2004
ACM
15 years 9 months ago
3TP: 3-D models transport protocol
This paper addresses the problem of streaming progressively compressed 3-D models over lossy networks. Out of all encoded packets that can be transmitted, we intelligently choose ...
Ghassan Al-Regib, Yucel Altunbasak
SIGCOMM
1995
ACM
15 years 7 months ago
Performance of Checksums and CRCs over Real Data
Checksum and CRC algorithms have historically been studied under the assumption that the data fed to the algorithms was uniformly distributed. This paper examines the behavior of ...
Craig Partridge, James Hughes, Jonathan Stone
WORM
2004
15 years 5 months ago
The top speed of flash worms
Flash worms follow a precomputed spread tree using prior knowledge of all systems vulnerable to the worm's exploit. In previous work we suggested that a flash worm could satu...
Stuart Staniford, David Moore, Vern Paxson, Nichol...
CN
2004
128views more  CN 2004»
15 years 3 months ago
A smooth handoff scheme using IEEE802.11 triggers - design and implementation
This paper proposes a handoff scheme in a wireless access network where IEEE802.11 is used as link layer protocol and Mobile IP as network layer protocol. The scheme uses triggers...
Peter De Cleyn, Nik Van den Wijngaert, Lloren&cced...
RAID
2010
Springer
15 years 1 months ago
What Is the Impact of P2P Traffic on Anomaly Detection?
Abstract. Recent studies estimate that peer-to-peer (p2p) traffic comprises 40-70% of today's Internet traffic [1]. Surprisingly, the impact of p2p traffic on anomaly detectio...
Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Kh...