Sciweavers

Share
TMC
2010
137views more  TMC 2010»
8 years 5 months ago
Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks
Wireless networks have evolved into an important technology for connecting users to the Internet. As the utility of wireless technology grows, wireless networks are being deployed ...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
IJSNET
2010
317views more  IJSNET 2010»
8 years 5 months ago
MRL-CC: a novel cooperative communication protocol for QoS provisioning in wireless sensor networks
: Cooperative communications have been demonstrated to be effective in combating the multiple fading effects in wireless networks, and improving the network performance in terms of...
Xuedong Liang, Min Chen, Yang Xiao, Ilangko Balasi...
COMJ
2010
8 years 7 months ago
JackTrip/SoundWIRE Meets Server Farm
Even though bidirectional, high-quality and low-latency audio systems for network performance are available, the complexity involved in setting up remote sessions needs better too...
Juan Pablo Cáceres, Chris Chafe
GLOBECOM
2009
IEEE
8 years 8 months ago
Cooperative Communications with Relay Selection for QoS Provisioning in Wireless Sensor Networks
Abstract--Cooperative communications have been demonstrated to be effective in combating the multiple fading effects in wireless networks, and improving the network performance in ...
Xuedong Liang, Ilangko Balasingham, Victor C. M. L...
SIGMETRICS
2002
ACM
118views Hardware» more  SIGMETRICS 2002»
8 years 10 months ago
Robust traffic engineering: game theoretic perspective
On-line routing algorithms deal with requests as they arrive without assuming any knowledge of the underlying process that generates the streams of requests. By contrast, off-line...
Vladimir Marbukh
ETT
2002
104views Education» more  ETT 2002»
8 years 10 months ago
Generalized window advertising for TCP congestion control
Congestion in the Internet is a major cause of network performance degradation. The Generalized Window Advertising (GWA) scheme proposed in this paper is a new approach for enhanci...
Mario Gerla, Renato Lo Cigno, Saverio Mascolo, Wen...
CORR
2007
Springer
124views Education» more  CORR 2007»
8 years 10 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
ADHOC
2008
72views more  ADHOC 2008»
8 years 10 months ago
MORA routing and capacity building in disruption-tolerant networks
Disruption-tolerant networks (DTNs) differ from other types of networks in that capacity is created by the movements of network participants. This implies that understanding and in...
Brendan Burns, Oliver Brock, Brian Neil Levine
SIGCOMM
2010
ACM
8 years 10 months ago
Detecting the performance impact of upgrades in large operational networks
Networks continue to change to support new applications, improve reliability and performance and reduce the operational cost. The changes are made to the network in the form of up...
Ajay Anil Mahimkar, Han Hee Song, Zihui Ge, Aman S...
MASCOTS
2004
8 years 11 months ago
Is TCP Packet Reordering Always Harmful?
IP networks do not provide any guarantee that packets belonging to the same flow are delivered in the correct order. It can be argued that out-of-order reception of packets is lim...
Giovanni Neglia, Vincenzo Falletta, Giuseppe Bianc...
books