Sciweavers

TON
2010
157views more  TON 2010»
12 years 10 months ago
Random Access Game and Medium Access Control Design
We study the contention/interaction among wireless nodes and med -ium access control design in game theory framework. We define a general class of games, called random access game...
Lijun Chen, Steven H. Low, John C. Doyle
TON
2010
167views more  TON 2010»
12 years 10 months ago
A Machine Learning Approach to TCP Throughput Prediction
TCP throughput prediction is an important capability in wide area overlay and multi-homed networks where multiple paths may exist between data sources and receivers. In this paper...
Mariyam Mirza, Joel Sommers, Paul Barford, Xiaojin...
TON
2010
138views more  TON 2010»
12 years 10 months ago
SUSE: superior storage-efficiency for routing tables through prefix transformation and aggregation
Abstract--A novel storage design for IP routing table construction is introduced on the basis of a single set-associative hash table to support fast longest prefix matching (LPM). ...
Fong Pong, Nian-Feng Tzeng
TON
2010
159views more  TON 2010»
12 years 10 months ago
Googling the internet: profiling internet endpoints via the world wide web
Understanding Internet access trends at a global scale, i.e., how people use the Internet, is a challenging problem that is typically addressed by analyzing network traces. However...
Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuz...
TON
2010
93views more  TON 2010»
12 years 10 months ago
On the Validity of IEEE 802.11 MAC Modeling Hypotheses
We identify common hypotheses on which a large number of distinct mathematical models of WLANs employing IEEE 802.11 are founded. Using data from an experimental test bed and packe...
K. D. Huang, Ken R. Duffy, David Malone
TON
2010
97views more  TON 2010»
12 years 10 months ago
Gradually reconfiguring virtual network topologies based on estimated traffic matrices
Traffic matrix, which is required as an input of traffic engineering (TE) methods, is difficult to be obtained directly. One possible approach to obtaining the traffic matrix is to...
Yuichi Ohsita, Takashi Miyamura, Shin'ichi Arakawa...
TON
2010
192views more  TON 2010»
12 years 10 months ago
Delay analysis for wireless networks with single hop traffic and general interference constraints
We consider a class of wireless networks with general interference constraints on the set of links that can be served simultaneously at any given time. We restrict the traffic to b...
Gagan Raj Gupta, Ness B. Shroff
TON
2010
93views more  TON 2010»
12 years 10 months ago
Design and field experimentation of an energy-efficient architecture for DTN throwboxes
Disruption tolerant networks rely on intermittent contacts between mobile nodes to deliver packets using a storecarry-and-forward paradigm. We earlier proposed the use of throwbox ...
Nilanjan Banerjee, Mark D. Corner, Brian Neil Levi...
TON
2010
125views more  TON 2010»
12 years 10 months ago
Computational analysis and efficient algorithms for micro and macro OFDMA downlink scheduling
OFDMA is one of the most important modulation and access methods for the future mobile networks. Before transmitting a frame on the downlink, an OFDMA base station has to invoke an...
Reuven Cohen, Liran Katzir
TON
2010
113views more  TON 2010»
12 years 10 months ago
Transmit Power Estimation Using Spatially Diverse Measurements Under Wireless Fading
Abstract--Received power measurements at spatially distributed monitors can be usefully exploited to deduce various characteristics of active wireless transmitters. In this paper, ...
Murtaza Zafer, Bongjun Ko, Ivan Wang Hei Ho