Sciweavers

CN
2008
280views more  CN 2008»
13 years 11 months ago
Joint transmit power and physical carrier sensing adaptation based on loss differentiation for high density IEEE 802.11 WLAN
In high density (HD) IEEE 802.11 WLAN, packet loss can occur due to co-channel interference (asynchronous interference) or collisions (synchronous interference). In order to effec...
Hui Ma, Jing Zhu, Sumit Roy, Soo Young Shin
CN
2008
84views more  CN 2008»
13 years 11 months ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
CN
2008
76views more  CN 2008»
13 years 11 months ago
Efficient path protection in bi-directional WDM systems
Bi-directional WDM transmission is a technique that allows data to be transmitted simultaneously in both directions of a fiber, with different sets of wavelength channels for each...
Ji Li, Kwan L. Yeung, Chun-Kit Chan
CN
2008
163views more  CN 2008»
13 years 11 months ago
Loss-resilient window-based congestion control
This paper addresses the problem of fair allocation of bandwidth resources on lossy channels in hybrid heterogeneous networks. It discusses more particularly the ability of window...
Christophe De Vleeschouwer, Pascal Frossard
CN
2008
83views more  CN 2008»
13 years 11 months ago
A framework for fast RFID tag reading in static and mobile environments
A framework for reducing the average reading time of passive RFID tags in dense environments is introduced. The proposed framework termed Accelerated Frame Slotted ALOHA (AFSA) ca...
Venkatesh Sarangan, M. R. Devarapalli, Sridhar Rad...
CN
2008
126views more  CN 2008»
13 years 11 months ago
Design and evaluation of flow handoff signalling for multihomed mobile nodes in wireless overlay networks
With the increasing deployment of wireless overlay networks, a mobile node with a range of network interfaces can be connected to multiple heterogeneous or homogeneous access netw...
Qi Wang, Robert Atkinson, John Dunlop
CN
2008
111views more  CN 2008»
13 years 11 months ago
Dynamic CPU provisioning for self-managed secure web applications in SMP hosting platforms
Overload control mechanisms such as admission control and connection differentiation have proven effective for preventing overload of application servers running secure web applic...
Jordi Guitart, David Carrera, Vicenç Beltra...
CN
2008
76views more  CN 2008»
13 years 11 months ago
Fast retransmit and fast recovery schemes of transport protocols: A survey and taxonomy
Although there are two standard transport protocols, TCP and UDP, offering services in the Internet, the majority of the traffic over the Internet is TCP-based. TCP-based applicat...
Cheng-Yuan Ho, Yaw-Chung Chen, Yi-Cheng Chan, Chen...
CN
2008
100views more  CN 2008»
13 years 11 months ago
Building resilient low-diameter peer-to-peer topologies
As more applications rely on underlying peer-to-peer topologies, the need for efficient and resilient infrastructure has become more pressing. A number of important classes of top...
Rita H. Wouhaybi, Andrew T. Campbell
CN
2008
117views more  CN 2008»
13 years 11 months ago
Broker-placement in latency-aware peer-to-peer networks
In large peer-to-peer (P2P) overlay networks, nodes usually share resources to support all kinds of applications. In such networks, a subset of the nodes may assume the role of br...
Pawel Garbacki, Dick H. J. Epema, Maarten van Stee...