Sciweavers

4962 search results - page 970 / 993
» Connectivity in Sub-Poisson Networks
Sort
View
CCR
2004
151views more  CCR 2004»
15 years 1 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
132
Voted
CCR
2004
116views more  CCR 2004»
15 years 1 months ago
End-to-end congestion control for TCP-friendly flows with variable packet size
Current TCP-friendly congestion control mechanisms adjust the packet rate in order to adapt to network conditions and obtain a throughput not exceeding that of a TCP connection op...
Jörg Widmer, Catherine Boutremans, Jean-Yves ...
COMPUTER
2004
162views more  COMPUTER 2004»
15 years 1 months ago
Context-Aware Trails
The growth of ubiquitous computing has given rise to a range of possibilities for context-based application development. Technologies for mobile computing and context-awareness can...
Siobhán Clarke, Cormac Driver
112
Voted
CCR
2002
85views more  CCR 2002»
15 years 1 months ago
Large-scale experimental study of Internet performance using video traffic
In this paper, we analyze the results of a seven-month real-time streaming experiment, which was conducted between a number of unicast dialup clients, connecting to the Internet t...
Dmitri Loguinov, Hayder Radha
124
Voted
CONCURRENCY
2000
101views more  CONCURRENCY 2000»
15 years 1 months ago
Wide-area parallel programming using the remote method invocation model
Java's support for parallel and distributed processing makes the language attractive for metacomputing applications, such as parallel applications that run on geographically ...
Rob van Nieuwpoort, Jason Maassen, Henri E. Bal, T...