120
click to vote
SIGCOMM
15 years 2 months ago
2005 ACM
Hash table is used as one of the fundamental modules in several network processing algorithms and applications such as route lookup, packet classification, per-flow state manage...
100
click to vote
SIGCOMM
15 years 2 months ago
2005 ACM
We consider wireless LANs such as IEEE 802.11 operating in the unlicensed radio spectrum. While their nominal bit rates have increased considerably, the MAC layer remains practica...
SIGCOMM
15 years 2 months ago
2005 ACM
Achieving efficient and fair bandwidth allocation while minimizing packet loss in high bandwidth-delay product networks has long been a daunting challenge. Existing endto-end cong...
89
Voted
SIGCOMM
15 years 2 months ago
2005 ACM
We consider the problem of routing in a delay tolerant network (DTN) in the presence of path failures. Previous work on DTN routing has focused on using precisely known network dy...
SIGCOMM
15 years 2 months ago
2005 ACM
This paper introduces a lightweight, scalable and accurate framework, called Meridian, for performing node selection based on network location. The framework consists of an overla...
|