Sciweavers

TON
2010
132views more  TON 2010»
13 years 9 months ago
Efficient and dynamic routing topology inference from end-to-end measurements
Jian Ni, Haiyong Xie 0002, Sekhar Tatikonda, Yang ...
TON
2010
117views more  TON 2010»
13 years 9 months ago
Pricing strategies for spectrum lease in secondary markets
—We develop analytical models to characterize pricing of spectrum rights in cellular CDMA networks. Specifically, we consider a primary license holder that aims to lease its spe...
Ashraf Al Daoud, Murat Alanyali, David Starobinski
TON
2010
89views more  TON 2010»
13 years 9 months ago
Demand-aware content distribution on the internet
—The rapid growth of media content distribution on the Internet in the past few years has brought with it commensurate increases in the costs of distributing that content. Can th...
Srinivas Shakkottai, Ramesh Johari
TON
2010
80views more  TON 2010»
13 years 9 months ago
Replication routing in DTNs: a resource allocation approach
—Routing protocols for disruption-tolerant networks (DTNs) use a variety of mechanisms, including discovering the meeting probabilities among nodes, packet replication, and netwo...
Aruna Balasubramanian, Brian Neil Levine, Arun Ven...
TON
2010
141views more  TON 2010»
13 years 9 months ago
Weighted spectral distribution for internet topology analysis: theory and applications
Abstract—Comparing graphs to determine the level of underlying structural similarity between them is a widely encountered problem in computer science. It is particularly relevant...
Damien Fay, Hamed Haddadi, Andrew Thomason, Andrew...
TON
2010
83views more  TON 2010»
13 years 9 months ago
Understanding and modeling the internet topology: economics and evolution perspective
Abstract—In this paper, we seek to understand the intrinsic reasons for the well-known phenomenon of heavy-tailed degree in the Internet AS graph and argue that in contrast to tr...
Xiaoming Wang, Dmitri Loguinov
TON
2010
118views more  TON 2010»
13 years 9 months ago
ILP formulations for p-cycle design without candidate cycle enumeration
—The concept of p-cycle (preconfigured protection cycle) allows fast and efficient span protection in wavelength division multiplexing (WDM) mesh networks. To design p-cycles f...
Bin Wu, Kwan L. Yeung, Pin-Han Ho
TON
2010
165views more  TON 2010»
13 years 9 months ago
An analytic throughput model for TCP NewReno
—This paper develops a simple and accurate stochastic model for the steady-state throughput of a TCP NewReno bulk data transfer as a function of round-trip time and loss rate. Ou...
Nadim Parvez, Anirban Mahanti, Carey L. Williamson
TON
2010
197views more  TON 2010»
13 years 9 months ago
Constrained relay node placement in wireless sensor networks: formulation and approximations
—One approach to prolong the lifetime of a wireless sensor network (WSN) is to deploy some relay nodes to communicate with the sensor nodes, other relay nodes, and the base stati...
Satyajayant Misra, Seung Don Hong, Guoliang Xue, J...