Sciweavers

CN
2006
60views more  CN 2006»
13 years 11 months ago
On the efficiency of fluid simulation of networks
Performance evaluation of computer networks through traditional packet-level simulation is becoming increasingly difficult as networks grow in size along different dimensions. Due...
Daniel R. Figueiredo, Benyuan Liu, Yang Guo, James...
CN
2006
174views more  CN 2006»
13 years 11 months ago
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey
Today's wireless networks are characterized by a fixed spectrum assignment policy. However, a large portion of the assigned spectrum is used sporadically and geographical var...
Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Sh...
CN
2006
107views more  CN 2006»
13 years 11 months ago
BGP session lifetime modeling in congested networks
The reliable Border Gateway Protocol (BGP) is essential for supporting high quality Internet data communication. In present Internet, due to the lack of differentiation mechanism ...
Li Xiao, Guanghui He, Klara Nahrstedt
CN
2006
95views more  CN 2006»
13 years 11 months ago
Generalized Nash Bargaining Solution for bandwidth allocation
For over a decade, the Nash Bargaining Solution (NBS) concept from cooperative game theory has been used in networks to share resources fairly. Due to its many appealing propertie...
Corinne Touati, Eitan Altman, Jérôme ...
CN
2006
70views more  CN 2006»
13 years 11 months ago
Preventing persistent oscillations and loops in IBGP configuration with route reflection
Abstract-- Internal Border Gateway Protocol (IBGP) is responsible for distributing external reachability information, obtained via External-BGP (EBGP) sessions, within an autonomou...
Anuj Rawat, Mark A. Shayman
CN
2006
87views more  CN 2006»
13 years 11 months ago
Lightweight thread tunnelling in network applications
Abstract. Active Network nodes are increasingly being used for nontrivial processing of data streams. These complex network applications typically benefit from protection between t...
Austin Donnelly
CN
2006
98views more  CN 2006»
13 years 11 months ago
Internet resiliency to attacks and failures under BGP policy routing
We investigate the resiliency of the Internet at the Autonomous System (AS) level to failures and attacks, under the real constraint of business agreements between the ASs. The ag...
Danny Dolev, Sugih Jamin, Osnat Mokryn, Yuval Shav...
CN
2006
84views more  CN 2006»
13 years 11 months ago
Exogenous-loss aware traffic management in overlay networks: Toward global fairness
For a given TCP flow, exogenous losses are those occurring on links other than the flow
Mina Guirguis, Azer Bestavros, Ibrahim Matta
CN
2006
67views more  CN 2006»
13 years 11 months ago
Integration of unicast and multicast scheduling in input-queued packet switches
Packet queuing and scheduling, two of the critical components in an input-queued packet switch, have been extensively studied in the context of either pure unicast traffic or pure...
Weiying Zhu, Min Song