Sciweavers

38 search results - page 6 / 8
» Modeling random early detection in a differentiated services...
Sort
View
INFOCOM
2009
IEEE
14 years 27 days ago
Budget-Based Self-Optimized Incentive Search in Unstructured P2P Networks
—Distributed object search is the primary function of Peer-to-Peer (P2P) file sharing system to locate and transfer the file. The predominant search schemes in unstructured P2P...
Yi Hu, Min Feng, Laxmi N. Bhuyan, Vana Kalogeraki
IH
1998
Springer
13 years 10 months ago
Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks
Theoretical modeling of watermarks allow prediction of the detector reliability and facilitates the development of more reliable systems. In particular, mathematical evaluation is ...
Jean-Paul M. G. Linnartz, Ton Kalker, Geert Depove...
INFOCOM
1998
IEEE
13 years 10 months ago
Explicit Window Adaptation: A Method to Enhance TCP Performance
We study the performance of TCP in an internetwork consisting of both rate-controlled and non-rate-controlled segments. A commonexample of such an environment occurs when the end ...
Lampros Kalampoukas, Anujan Varma, K. K. Ramakrish...
ICC
2008
IEEE
130views Communications» more  ICC 2008»
14 years 21 days ago
Managing Network Congestion with a Kohonen-Based RED Queue
— The behaviour of the TCP AIMD algorithm is known to cause queue length oscillations when congestion occurs at a router output link. Indeed, due to these queueing variations, en...
Emmanuel Lochin, Bruno Talavera
CONEXT
2008
ACM
13 years 8 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...