Sciweavers

NETWORKING
2007
14 years 1 months ago
On the Resilient Overlay Topology Formation in Multi-hop Wireless Networks
In this paper, we study the problem of how to design overlay topologies in multi-hop wireless networks such that the overlays achieve perfect resilience, in terms of all cooperativ...
Fei Xing, Wenye Wang
NETWORKING
2007
14 years 1 months ago
Enhancing Guaranteed Delays with Network Coding
—For networks providing QoS guarantees, this paper determines and evaluates the worst case end-to-end delays for strategies based on network coding and multiplexing. It is shown ...
Ali Mahmino, Jérôme Lacan, Christian ...
NETWORKING
2007
14 years 1 months ago
Location-Unaware Sensing Range Assignment in Sensor Networks
We study field-monitoring applications in which sensors are deployed in large numbers and the sensing process is expensive. In such applications, nodes should use the minimum poss...
Ossama Younis, Srinivasan Ramasubramanian, Marwan ...
NETWORKING
2007
14 years 1 months ago
Localization for Large-Scale Underwater Sensor Networks
Abstract. In this paper, we study the localization problem in large-scale underwater sensor networks. The adverse aqueous environments, the node mobility, and the large network sca...
Zhong Zhou, Jun-Hong Cui, Shengli Zhou
NETWORKING
2007
14 years 1 months ago
Graph Based Modeling of P2P Streaming Systems
This paper addresses the study of fundamental properties of stream-based content distribution services. We assume the presence of an overlay network with limited connectivity degre...
Damiano Carra, Renato Lo Cigno, Ernst W. Biersack
NETWORKING
2007
14 years 1 months ago
Construction of a Proxy-Based Overlay Skeleton Tree for Large-Scale Real-Time Group Communications
Abstract. We consider the problem of constructing a proxy-based overlay skeleton tree (POST) in the backbone service domain of a two-tier overlay multicast infrastructure. Spanning...
Jun Guo, Sanjay Jha
NETWORKING
2007
14 years 1 months ago
The TCP Minimum RTO Revisited
We re-examine the two reasons for the conservative 1-second Minimum TCP-RTO to protect against spurious timeouts: i) the OS clock granularity and ii) the Delayed ACKs. We find tha...
Ioannis Psaras, Vassilis Tsaoussidis
NETWORKING
2007
14 years 1 months ago
The P2P War: Someone Is Monitoring Your Activities!
Anirban Banerjee, Michalis Faloutsos, Laxmi N. Bhu...
NETWORKING
2007
14 years 1 months ago
Interactions of Intelligent Route Control with TCP Congestion Control
Ruomei Gao, Dana Blair, Constantine Dovrolis, Moni...