Sciweavers

87
Voted
ICNP
2007
IEEE
15 years 9 months ago
Improving the Convergence and Stability of Congestion Control Algorithm
Xiaomeng Huang, Chuang Lin, Fengyuan Ren, Guangwen...
109
Voted
ICNP
2007
IEEE
15 years 9 months ago
A Poisoning-Resilient TCP Stack
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Amit Mondal, Aleksandar Kuzmanovic
ICNP
2007
IEEE
15 years 9 months ago
Adaptive Optimization of Rate Adaptation Algorithms in Multi-Rate WLANs
— Rate adaptation is one of the basic functionalities in today’s 802.11 wireless LANs (WLANs). Although it is primarily designed to cope with the variability of wireless channe...
Jaehyuk Choi, Jongkeun Na, Kihong Park, Chong-kwon...
96
Voted
ICNP
2007
IEEE
15 years 9 months ago
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs
— In many traditional mobile network scenarios, nodes establish communication on the basis of persistent public identities. However, in some hostile and suspicious MANET settings...
Karim M. El Defrawy, Gene Tsudik
112
Voted
ICNP
2007
IEEE
15 years 9 months ago
Best Effort Session-Level Congestion Control
— Congestion caused by a large number of interacting TCP flows at a bottleneck network link is different from that caused by a lesser number of flows sending large amounts of d...
S. Ramesh, Sneha Kumar Kasera
85
Voted
ICNP
2007
IEEE
15 years 9 months ago
Price of Asynchrony: Queuing under Ideally Smooth Congestion Control
Maxim Podlesny, Sergey Gorinsky
ICNP
2007
IEEE
15 years 9 months ago
Identifying High Throughput Paths in 802.11 Mesh Networks: a Model-based Approach
Abstract— We address the problem of identifying high throughput paths in 802.11 wireless mesh networks. We introduce an analytical model that accurately captures the 802.11 MAC p...
Theodoros Salonidis, Michele Garetto, A. Saha, Edw...
118
Voted
ICNP
2007
IEEE
15 years 9 months ago
Source Address Validation: Architecture and Protocol Design
The current Internet addressing architecture does not verify the source address of a packet received and forwarded. This causes serious security and accounting problems. Based on t...
Jianping Wu, Gang Ren, Xing Li
92
Voted
ICNP
2007
IEEE
15 years 9 months ago
TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs
Chad R. Meiners, Alex X. Liu, Eric Torng
127
Voted
ICNP
2007
IEEE
15 years 9 months ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...