Sciweavers

INFOCOM
2005
IEEE
14 years 2 months ago
Practical algorithms for performance guarantees in buffered crossbars
— This paper is about high capacity switches and routers that give guaranteed throughput, rate and delay guarantees. Many routers are built using input queueing or combined input...
Shang-Tse Chuang, Sundar Iyer, Nick McKeown
INFOCOM
2005
IEEE
14 years 2 months ago
Dependency isolation for thread-based multi-tier Internet services
— Multi-tier Internet service clusters often contain complex calling dependencies among service components spreading across cluster nodes. Without proper handling, partial failur...
Lingkun Chu, Kai Shen, Hong Tang, Tao Yang, Jingyu...
INFOCOM
2005
IEEE
14 years 2 months ago
Exploiting diversity to enhance multimedia streaming over cellular links
Abstract— Wireless Wide Area Networks (WWANs) are becoming ubiquitous across most geographic regions, enabling simultaneous coverage from multiple providers. WWAN channels exhibi...
Julian Chesterfield, Rajiv Chakravorty, Ian Pratt,...
INFOCOM
2005
IEEE
14 years 2 months ago
SCOPE: scalable consistency maintenance in structured P2P systems
— While current Peer-to-Peer (P2P) systems facilitate static file sharing, newly-developed applications demand that P2P systems be able to manage dynamically-changing files. Ma...
Xin Chen, Shansi Ren, Haining Wang, Xiaodong Zhang
INFOCOM
2005
IEEE
14 years 2 months ago
Joint congestion control and media access control design for ad hoc wireless networks
Abstract— We present a model for the joint design of congestion control and media access control (MAC) for ad hoc wireless networks. Using contention graph and contention matrix,...
Lijun Chen, Steven H. Low, John C. Doyle
INFOCOM
2005
IEEE
14 years 2 months ago
Limiting path exploration in BGP
— Slow convergence in the Internet can be directly attributed to the “path exploration” phenomenon, inherent in all path vector protocols. The root cause for path exploration...
Jaideep Chandrashekar, Zhenhai Duan, Zhi-Li Zhang,...
INFOCOM
2005
IEEE
14 years 2 months ago
Minimum energy accumulative routing in wireless networks
— In this paper, we propose to address the energy efficient routing problem in multi-hop wireless networks with accumulative relay. In the accumulative relay model, partially ov...
Jiangzhuo Chen, Lujun Jia, Xin Liu, Guevara Noubir...
INFOCOM
2005
IEEE
14 years 2 months ago
The impact of network variabilities on TCP clocking schemes
Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-L...
INFOCOM
2005
IEEE
14 years 2 months ago
PIKE: peer intermediaries for key establishment in sensor networks
— The establishment of shared cryptographic keys between communicating neighbor nodes in sensor networks is a challenging problem due to the unsuitability of asymmetric key crypt...
Haowen Chan, Adrian Perrig
INFOCOM
2005
IEEE
14 years 2 months ago
Optimizing cost-sensitive trust-negotiation protocols
Trust negotiation is a process that establishes mutual trust by the exchange of digital credentials and/or guiding policies among entities who may have no pre-existing knowledge a...
Weifeng Chen, L. Clarke, James F. Kurose, Donald F...