Sciweavers

613 search results - page 113 / 123
» DiffServ over Network Processors: Implementation and Evaluat...
Sort
View
MSWIM
2004
ACM
15 years 3 months ago
IEEE 802.11 rate adaptation: a practical approach
Today, three different physical (PHY) layers for the IEEE 802.11 WLAN are available (802.11a/b/g); they all provide multi-rate capabilities. To achieve a high performance under v...
Mathieu Lacage, Mohammad Hossein Manshaei, Thierry...
INFOCOM
2010
IEEE
14 years 8 months ago
TopBT: A Topology-Aware and Infrastructure-Independent BitTorrent Client
—BitTorrent (BT) has carried out a significant and continuously increasing portion of Internet traffic. While several designs have been recently proposed and implemented to imp...
Shansi Ren, Enhua Tan, Tian Luo, Songqing Chen, Le...
ANCS
2007
ACM
15 years 1 months ago
A programmable message classification engine for session initiation protocol (SIP)
Session Initiation Protocol (SIP) has begun to be widely deployed for multiple services such as VoIP, Instant Messaging and Presence. Each of these services uses different SIP mes...
Arup Acharya, Xiping Wang, Charles Wright
CN
2008
100views more  CN 2008»
14 years 9 months ago
Building resilient low-diameter peer-to-peer topologies
As more applications rely on underlying peer-to-peer topologies, the need for efficient and resilient infrastructure has become more pressing. A number of important classes of top...
Rita H. Wouhaybi, Andrew T. Campbell
EUROSYS
2010
ACM
15 years 2 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry