Sciweavers

INFOCOM
2005
IEEE
14 years 6 months ago
On failure detection algorithms in overlay networks
— One of the key reasons overlay networks are seen as an excellent platform for large scale distributed systems is their resilience in the presence of node failures. This resilie...
Shelley Zhuang, Dennis Geels, Ion Stoica, Randy H....
ICMCS
2005
IEEE
95views Multimedia» more  ICMCS 2005»
14 years 6 months ago
Optimization of source and channel coding for voice over IP
Voice over Internet Protocol (VoIP) applications must typically choose a tradeoff between the bits allocated for Forward Error Correcting (FEC) and that for the source coding to a...
Yicheng Huang, Jari Korhonen, Ye Wang
ICC
2007
IEEE
130views Communications» more  ICC 2007»
14 years 6 months ago
Queuing with Adaptive Modulation over MIMO Wireless Links for Deadline Constrained Traffic: Cross-Layer Analysis and Design
In this paper, we consider a deadline constrained traffic and analyze the joint effects of packet queuing and adaptive modulation (AM) for packet transmission in MIMO systems. We p...
Jalil S. Harsini, Farshad Lahouti
GLOBECOM
2007
IEEE
14 years 6 months ago
Semi-Markov Modeling for Bandwidth Sharing of TCP Connections with Asymmetric AIMD Congestion Control
— This paper presents a semi-Markov model that evaluates the performance of TCP connections with asymmetric Additive Increase and Multiplicative Decrease (AIMD) congestion contro...
Cheng Peng Fu, Chuan Heng Foh, Chiew Tong Lau, Zhi...
ICIP
2007
IEEE
15 years 2 months ago
Stream Authentication Based on Generlized Butterfly Graph
This paper proposes a stream authentication method based on the Generalized Butterfly Graph (GBG) framework. Compared with the original Butterfly graph, the proposed GBG graph sup...
Zhishou Zhang, John G. Apostolopoulos, Qibin Sun, ...