Sciweavers

CCR
2004
89views more  CCR 2004»
13 years 7 months ago
Should we build Gnutella on a structured overlay?
There has been much interest in both unstructured and structured overlays recently. Unstructured overlays, like Gnutella, build a random graph and use flooding or random walks on ...
Miguel Castro, Manuel Costa, Antony I. T. Rowstron
CCR
2004
110views more  CCR 2004»
13 years 7 months ago
Distributed scheduling policies in networks of input-queued packet switches
Scheduling algorithms for input-queued packet switches have been widely researched. It has been shown that various classes of scheduling algorithms provide guarantees on stability ...
Claus Bauer
CCR
2004
63views more  CCR 2004»
13 years 7 months ago
QoS-aware multicasting in DiffServ domains
Although many QoS-based multicast routing protocols have been proposed in recent years, most of them are based on per-flow resource reservation, which cannot be deployed within dif...
Zhi Li, Prasant Mohapatra
CCR
2004
103views more  CCR 2004»
13 years 7 months ago
Reconsidering wireless systems with multiple radios
The tremendous popularity of wireless systems in recent years has led to the commoditization of RF transceivers (radios) whose prices have fallen dramatically. The lower cost allo...
Paramvir Bahl, Atul Adya, Jitendra Padhye, Alec Wo...
CCR
2004
80views more  CCR 2004»
13 years 7 months ago
An analysis of TCP reset behaviour on the internet
This paper presents a one-year study of Internet packet traffic from a large campus network, showing that 15-25% of TCP connections have at least one TCP RST (reset). Similar resu...
Martin F. Arlitt, Carey L. Williamson
CCR
2004
76views more  CCR 2004»
13 years 7 months ago
Practical, distributed network coordinates
Russ Cox, Frank Dabek, M. Frans Kaashoek, Jinyang ...
CCR
2004
79views more  CCR 2004»
13 years 7 months ago
Preventing Internet denial-of-service with capabilities
In this paper, we propose a new approach to preventing and constraining denial-of-service (DoS) attacks. Instead of being able to send anything to anyone at any time, in our archi...
Thomas E. Anderson, Timothy Roscoe, David Wetheral...
CCR
2004
90views more  CCR 2004»
13 years 7 months ago
A constraint satisfaction approach to testbed embedding services
Today's networking community is becoming increasingly skeptical of the significance of research results founded wholly upon experimental results conducted in simulation. Now, ...
Jeffrey Considine, John W. Byers, Ketan Meyer-Pate...
CCR
2004
86views more  CCR 2004»
13 years 7 months ago
On the scaling of congestion in the internet graph
As the Internet grows in size, it becomes crucial to understand how the speeds of links in the network must improve in order to sustain the pressure of new end-nodes being added e...
Aditya Akella, Shuchi Chawla, Arvind Kannan, Srini...
CCR
2004
100views more  CCR 2004»
13 years 7 months ago
Capacity bounds for ad hoc and hybrid wireless networks
Ashish Agarwal, P. R. Kumar