Sciweavers

CONEXT
2006
ACM
13 years 10 months ago
How small labels create big improvements
Pan Hui, Jon Crowcroft
CONEXT
2006
ACM
13 years 10 months ago
Wireless alternative best effort service: a case study of ALM
Cyrine Mrabet, Mohamed Ali Kâafar, Farouk Ka...
CONEXT
2006
ACM
13 years 10 months ago
Neighbor discovery analysis in wireless sensor networks
In wireless sensor networks, hello protocols for neighbor discovery are a basic service offered by the networking stack. However, their study usually rely on rather simplistic mo...
Elyes Ben Hamida, Guillaume Chelius, Eric Fleury
CONEXT
2006
ACM
13 years 10 months ago
Modeling ping times in first person shooter games
In First Person Shooter (FPS) games the Round Trip Time (RTT), i.e., the sum of the network delay from client to server and the network delay from server to client, impacts the ga...
Natalie Degrande, Danny De Vleeschauwer, Robert E....
CONEXT
2006
ACM
13 years 10 months ago
P2P IPTV measurement: a case study of TVants
Thomas Silverston, Olivier Fourmaux
CONEXT
2006
ACM
13 years 10 months ago
Inferring groups of correlated failures
We compare and evaluate different methods to infer groups of correlated failures. These methods try to group failure events occurring nearly simultaneously in clusters. Indeed if...
Jean Lepropre, Guy Leduc
CONEXT
2006
ACM
13 years 10 months ago
Eliminating channel scanning phase in handoff across IEEE 802.11 wireless LANs
Jaeouk Ok, Pedro Morales, Andreas Darmawan, Hiroyu...
CONEXT
2006
ACM
13 years 10 months ago
A study of end-to-end web access failures
We present a study of end-to-end web access failures in the Internet. Part of our characterization of failures is based on directly observable end-to-end information. We also pres...
Venkata N. Padmanabhan, Sriram Ramabhadran, Sharad...