Ubiquitous computing systems can be regarded as open systems where heterogeneous and previously unknown entities may spontaneously interact, due to intrinsic mobility of users and...
The Internet network technology today does not allow a sufficient degree of autonomy to express user choices, constraints and preferences in order to dynamically obtain the most su...
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
Abstract—In this paper we propose two polling based scheduling schemes for applications based on TCP in a multipointto-point IEEE 802.16 network. The first scheme uses TCP conge...
IPTV is increasingly being deployed and offered as a commercial service to residential broadband customers. Compared with traditional ISP networks, an IPTV distribution network (i...
Ajay Anil Mahimkar, Zihui Ge, Aman Shaikh, Jia Wan...