Sciweavers

ICNP
2007
IEEE
14 years 5 months ago
Lexicographic products in metarouting
— Routing protocols often keep track of multiple route metrics, where some metrics are more important than others. Route selection is then based on lexicographic comparison: the ...
Alexander J. T. Gurney, Timothy G. Griffin
ICNP
2007
IEEE
14 years 5 months ago
A Performance Study of Loss Detection/Recovery in Real-world TCP Implementations
— TCP is the dominant transport protocol used in the Internet and its performance fundamentally governs the performance of Internet applications. It is well-known that packet los...
Sushant Rewaskar, Jasleen Kaur, F. Donelson Smith
ICNP
2007
IEEE
14 years 5 months ago
Inferring the Origin of Routing Changes using Link Weights
— The global Internet routing infrastructure is a large and complex distributed system where routing changes occur constantly. Our objective in this paper is to develop a simple ...
Mohit Lad, Ricardo V. Oliveira, Daniel Massey, Lix...
ICNP
2007
IEEE
14 years 5 months ago
A Game Theoretic Framework of Distributed Power and Rate Control in IEEE 802.11 WLANs
—We present a game-theoretic study on the power and rate control problem in IEEE 802.11 WLANs where network participants choose appropriate transmission power and data rate to ac...
Lin Chen, Jean Leneutre
ICNP
2007
IEEE
14 years 5 months ago
Greedy Virtual Coordinates for Geographic Routing
— We present a new approach for generating virtual coordinates that produces usable coordinates quickly and improves the routing performance of existing geographic routing algori...
Ben Leong, Barbara Liskov, Robert Morris
ICNP
2007
IEEE
14 years 5 months ago
Scheduled PSM for Minimizing Energy in Wireless LANs
Power conservation is a general concern for mobile computing and communication. In this paper, we investigate the performance of the current 802.11 power saving mechanism (unschedu...
Yong He, Ruixi Yuan, Xiaojun Ma, Jun Li, C. Wang
ICNP
2007
IEEE
14 years 5 months ago
FireCracker: A Framework for Inferring Firewall Policies using Smart Probing
A firewall policy that is correct and complete is crucial to the safety of a computer network. An adversary will benefit a lot from knowing the policy or its semantics. In this pap...
Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer
ICNP
2007
IEEE
14 years 5 months ago
Loss and Delay Accountability for the Internet
— The Internet provides no information on the fate of transmitted packets, and end systems cannot determine who is responsible for dropping or delaying their traffic. As a resul...
Katerina J. Argyraki, Petros Maniatis, O. Irzak, S...
ICNP
2007
IEEE
14 years 5 months ago
Improving the Convergence and Stability of Congestion Control Algorithm
Xiaomeng Huang, Chuang Lin, Fengyuan Ren, Guangwen...
ICNP
2007
IEEE
14 years 5 months ago
A Poisoning-Resilient TCP Stack
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Amit Mondal, Aleksandar Kuzmanovic