— One of the key reasons overlay networks are seen as an excellent platform for large scale distributed systems is their resilience in the presence of node failures. This resilie...
Shelley Zhuang, Dennis Geels, Ion Stoica, Randy H....
Voice over Internet Protocol (VoIP) applications must typically choose a tradeoff between the bits allocated for Forward Error Correcting (FEC) and that for the source coding to a...
In this paper, we consider a deadline constrained traffic and analyze the joint effects of packet queuing and adaptive modulation (AM) for packet transmission in MIMO systems. We p...
— This paper presents a semi-Markov model that evaluates the performance of TCP connections with asymmetric Additive Increase and Multiplicative Decrease (AIMD) congestion contro...
This paper proposes a stream authentication method based on the Generalized Butterfly Graph (GBG) framework. Compared with the original Butterfly graph, the proposed GBG graph sup...
Zhishou Zhang, John G. Apostolopoulos, Qibin Sun, ...