Sciweavers

NETWORKING
2004
13 years 6 months ago
Stealth Multicast: A Novel Catalyst for Network-Level Multicast Deployment
While network-level multicast has tremendous potential for increasing the efficiency of group-oriented applications, the adoption of network-level multicast has been tepid at best....
Aaron Striegel
NETWORKING
2004
13 years 6 months ago
A Lightweight Content Replication Scheme for Mobile Ad Hoc Environments
Vineet Thanedar, Kevin C. Almeroth, Elizabeth M. B...
NETWORKING
2004
13 years 6 months ago
Distributed Channel Monitoring for Wireless Bandwidth Aggregation
Puneet Sharma, Sung-Ju Lee, Jack Brassil, Kang G. ...
NETWORKING
2004
13 years 6 months ago
A-STAR: A Mobile Ad Hoc Routing Strategy for Metropolis Vehicular Communications
Abstract. One of the major issues that affect the performance of Mobile Ad hoc NETworks (MANET) is routing. Recently, position-based routing for MANET is found to be a very promisi...
Boon-Chong Seet, Genping Liu, Bu-Sung Lee, Chuan H...
NETWORKING
2004
13 years 6 months ago
Analysis of a Finite Number of Deflections in Fully and Uniformly Loaded Regular Networks
This paper presents an analytical methodology to obtain steady state throughput of a uniformly and fully loaded regular network. The network operates using deflection routing under...
Ireneusz Szczesniak
NETWORKING
2004
13 years 6 months ago
The Sensitivity of TCP to Sudden Delay Variations in Mobile Networks
Abstract. This paper studies the impact of variable transmission delays on the Transmission Control Protocol (TCP). Sudden delay variations, which are not uncommon in mobile networ...
Michael Scharf, Marc Necker, Bernd Gloss
NETWORKING
2004
13 years 6 months ago
Stabilized Edge-to-Edge Aggregate Flow Control
In this paper, we present a distributed flow control scheme which achieves weighted max-min fair bandwidth allocation among all source-destination pairs on a per-aggregate basis wi...
Hyung-Keun Ryu, Jeong-woo Cho, Song Chong
NETWORKING
2004
13 years 6 months ago
Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications
Firewalls are a well-established security mechanism to restrict the traffic exchanged between networks to a certain subset of users and applications. In order to cope with new appl...
Utz Roedig, Jens Schmitt
NETWORKING
2004
13 years 6 months ago
Combining Source- and Localized Recovery to Achieve Reliable Multicast in Multi-hop Ad Hoc Networks
This paper proposes a novel reliable multicast transport protocol for multi-hop, wireless ad hoc networks (or MANETs). To recover from the different types of losses that may occur ...
Venkatesh Rajendran, Katia Obraczka, Yunjung Yi, S...