Sciweavers

Share
NETWORKING
2004
8 years 11 months ago
Improving the Performance of TCP in the Presence of Interacting UDP Flows in Ad Hoc Networks
In this paper, we study how fairness affects the performance of TCP over ad hoc networks with IEEE 802.11 at the MAC layer. The problem addressed is that the throughput of TCP flow...
Vikram Gupta, Srikanth V. Krishnamurthy, Michalis ...
NETWORKING
2004
8 years 11 months ago
Call Admission Control for Voice/Data Integration in Broadband Wireless Networks
This paper addresses bandwidth allocation for an integrated voice/data broadband mobile wireless network. Specifically, we propose a new admission control scheme called EFGC, whic...
Majid Ghaderi, Raouf Boutaba
NETWORKING
2004
8 years 11 months ago
Metadata Design for Introspection-Capable Reconfigurable Systems
Global vision consensus on the next generation of wireless mobile communications, broadly termed 4G, sketches a hybrid infrastructure, comprising different wireless access systems ...
Vangelis Gazis, Nancy Alonistioti, Lazaros F. Mera...
NETWORKING
2004
8 years 11 months ago
A Geometric Derivation of the Probability of Finding a Relay in Multi-rate Networks
Abstract. Relaying can improve performance of a wireless network, especially when different transmission modes with distance/cost tradeoffs are available. Examples of such modes in...
Laura Marie Feeney, Daniel Hollos, Martin Kubisch,...
NETWORKING
2004
8 years 11 months ago
LMPS: Localized Multi-path Selection for QoS Routing in VoIP Networks
Abstract. Localized QoS routing techniques were proposed to achieve acceptable performance without exchanging global state information over the network. In such techniques, the ing...
Khaled M. F. Elsayed, Hassan Fadel, Amin M. Nassar
NETWORKING
2004
8 years 11 months ago
An Efficient Probabilistic Packet Marking Scheme for IP Traceback
Abstract. Denial of Service (DoS) attacks represent a major threat to the availability of Internet services. Identifying the sources of these attacks is considered an important ste...
Basheer Al-Duwairi, Anirban Chakrabarti, Govindara...
NETWORKING
2004
8 years 11 months ago
Secure Reverse Communication in a Multicast Tree
Abstract. Multicast content delivery can be expected to become a major source of revenue with the increase of private broadband fixed and mobile communications. Several multicast a...
Josep Domingo-Ferrer, Antoni Martínez-Balle...
NETWORKING
2004
8 years 11 months ago
High Coverage Broadcasting for Mobile Ad Hoc Networks
A family of message propagation protocols for highly mobile ad-hoc networks is defined, and is studied analytically and by simulation. The coverage of a message (the fraction of no...
Dave E. Cooper, Paul D. Ezhilchelvan, Isi Mitrani
NETWORKING
2004
8 years 11 months ago
TCP-DCR: Making TCP Robust to Non-congestion Events
In this paper, we propose and evaluate TCP-DCR. TCP-DCR makes simple modifications to the TCP congestion control algorithm to make it more robust to non-congestion events. The key ...
Sumitha Bhandarkar, A. L. Narasimha Reddy
NETWORKING
2004
8 years 11 months ago
Traffic Grooming in WDM Ring Networks with the Min-Max Objective
We consider the problem of traffic grooming in WDM ring networks. Previous studies have focused on minimizing aggregate representations of the network cost. In this work, we consid...
Bensong Chen, George N. Rouskas, Rudra Dutta
books