Sciweavers

NETWORKING
2007
13 years 10 months ago
TCP Libra : Exploring RTT-Fairness for TCP
Gustavo Marfia, Claudio E. Palazzi, Giovanni Pau, ...
NETWORKING
2007
13 years 10 months ago
Enhanced Rate Adaptation Schemes with Collision Awareness
While many existing rate adaptation schemes in IEEE 802.11 Wireless LANs result in severe throughput degradation since they do not consider the collision effect when selecting the...
Seongkwan Kim, Sunghyun Choi, Daji Qiao, Jongseok ...
NETWORKING
2007
13 years 10 months ago
Optimal Topology Design for Overlay Networks
Abstract. The topology creation is one of the most important step for the design of an overlay network. Traffic characteristic and volume, and behavior of nodes which can be sel...
Mina Kamel, Caterina M. Scoglio, Todd Easton
NETWORKING
2007
13 years 10 months ago
Measuring Bandwidth Signatures of Network Paths
In this paper, we propose a practical and efficient technique, Forecaster, to estimate (1) the end-to-end available bandwidth, and (2) the speed of the most congested (tight) link ...
Mradula Neginhal, Khaled Harfoush, Harry G. Perros
NETWORKING
2007
13 years 10 months ago
Beyond Proportional Fair: Designing Robust Wireless Schedulers
Abstract. Proportional Fair (PF), a frequently used scheduling algorithm in 3G wireless networks, can unnecessarily starve “well-behaved” users in practice. One of the main cau...
Soshant Bali, Sridhar Machiraju, Hui Zang
NETWORKING
2007
13 years 10 months ago
Interference-Aware Multicasting in Wireless Mesh Networks
Multicasting is one of the most important applications in Wireless Ad hoc Networks and the currently emerging Wireless Mesh Networks. In such networks, interference due to the shar...
Sudheendra Murthy, Abhishek Goswami, Arunabha Sen
NETWORKING
2007
13 years 10 months ago
Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...
Selim Volkan Kaya, Erkay Savas, Albert Levi, Ö...
NETWORKING
2007
13 years 10 months ago
The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts
Abstract. Our Token Based Switch (TBS) implementation shows that a packetbased admission control system can be used to dynamically select a fast end-to-end connection over a hybrid...
Mihai-Lucian Cristea, Leon Gommans, Li Xu, Herbert...
NETWORKING
2007
13 years 10 months ago
Optimization Models for the Radio Planning of Wireless Mesh Networks
In this paper we propose novel optimization models for the planning of Wireless Mesh Networks whose objective is to minimize the network installation cost, while providing full cov...
Edoardo Amaldi, Antonio Capone, Matteo Cesana, Fed...
NETWORKING
2007
13 years 10 months ago
Simple Models for the Performance Evaluation of a Class of Two-Hop Relay Protocols
We evaluate the performance of a class of two-hop relay protocols for mobile ad hoc networks. The interest is on the multicopy two-hop relay (MTR) protocol, where the source may ge...
Ahmad Al Hanbali, Arzad Alam Kherani, Philippe Nai...