Sciweavers

53 search results - page 1 / 11
» End-to-end coding for TCP
Sort
View
WCNC
2010
IEEE
13 years 3 months ago
End-To-End HARQ in Cognitive Radio Networks
Abstract—Cognitive radio networks (CRN) may greatly enhance the throughput based on a given bandwidth. CRN has a unique feature, consisting of uni-directional opportunistic wirel...
Weng-Chon Ao, Kwang-Cheng Chen
INFOCOM
1996
IEEE
13 years 9 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
OSDI
2004
ACM
14 years 5 months ago
Deploying Safe User-Level Network Services with icTCP
We present icTCP, an "information and control" TCP implementation that exposes key pieces of internal TCP state and allows certain TCP variables to be set in a safe fash...
Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, Remzi...
USENIX
1994
13 years 6 months ago
Probing TCP Implementations
In this paper, we demonstrate a technique called active probing used to study TCP implementations. Active probing treats a TCP implementation as a black box, and uses a set of pro...
Douglas Comer, John C. Lin
COMCOM
2010
95views more  COMCOM 2010»
13 years 5 months ago
CODE TCP: A competitive delay-based TCP
Yi-Cheng Chan, Chia-Liang Lin, Chia-Tai Chan, Chen...