Sciweavers

1639 search results - page 213 / 328
» Degree-constrained network flows
Sort
View
96
Voted
CCR
2010
179views more  CCR 2010»
15 years 27 days ago
An argument for increasing TCP's initial congestion window
TCP flows start with an initial congestion window of at most four segments or approximately 4KB of data. Because most Web transactions are short-lived, the initial congestion wind...
Nandita Dukkipati, Tiziana Refice, Yuchung Cheng, ...
102
Voted
HICSS
2003
IEEE
90views Biometrics» more  HICSS 2003»
15 years 6 months ago
Web Community of Agents for the Integrated Logistics of Industrial Districts
The industrial districts are characterized by the agglomeration of medium and small-sized industries, localized within a certain geographic area with precise social and cultural c...
Mauro Dell'Orco, Raffaele Giordano
120
Voted
CN
2008
84views more  CN 2008»
15 years 26 days ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
96
Voted
ICCD
2006
IEEE
121views Hardware» more  ICCD 2006»
15 years 9 months ago
Power/ground supply network optimization for power-gating
-- Power-gating is a technique for efficiently reducing leakage power by shutting off the idle blocks. However, the presence of power-gating may also introduce negative effects on ...
Hailin Jiang, Malgorzata Marek-Sadowska
114
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen