Sciweavers

448 search results - page 70 / 90
» Modeling the Burstiness of TCP
Sort
View
CDC
2008
IEEE
118views Control Systems» more  CDC 2008»
15 years 6 months ago
Congestion control for small queues: Analysis and evaluation of a new protocol
— A new congestion control protocol is presented, analyzed and experimentally evaluated. It consists of the standard inner-loop ACK-clock and a novel outer-loop adjusting the win...
Niels Möller, Karl Henrik Johansson
119
Voted
ICNP
1998
IEEE
15 years 4 months ago
Congestion Control Performance of a Reliable Multicast Protocol
This paper evaluates the congestion control performance of Pseudofed, a congestion-controlled, reliable multicast transport protocol for bulk data transfer. Pseudofed's conge...
Dante DeLucia, Katia Obraczka
CONEXT
2007
ACM
15 years 1 months ago
Promoting fluidity in the flow of packets of 802.11 wireless mesh networks
Wireless Mesh Networks (WMNs) are based on packet forwarding and therefore require efficient multi-hop protocols for their deployment. Toward this objective, we study the flow o...
Adel Aziz, Roger Karrer, Patrick Thiran
USITS
2003
15 years 1 months ago
Anypoint: Extensible Transport Switching on the Edge
Anypoint is a new model for one-to-many communication with ensemble sites—aggregations of end nodes that appear to the external Internet as a unified site. Policies for routing...
Ken Yocum, Darrell C. Anderson, Jeffrey S. Chase, ...
IJNSEC
2008
96views more  IJNSEC 2008»
14 years 11 months ago
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks
In flow-based mix networks, flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In ...
Ye Zhu, Xinwen Fu, Riccardo Bettati