Sciweavers

7329 search results - page 402 / 1466
» Network Extractor Protocols
Sort
View
ISCC
2005
IEEE
15 years 10 months ago
A Game Theoretic Analysis of Protocols Based on Fountain Codes
In this paper we analyze a novel paradigm of reliable communications which is not based on the traditional timeout-and-retransmit mechanism of TCP. Our approach, which we call FBP...
Luis López, Antonio Fernández, Vicen...
111
Voted
WOWMOM
2005
ACM
131views Multimedia» more  WOWMOM 2005»
15 years 10 months ago
Ad-Hoc Extensions to the 802.15.3 MAC Protocol
The paper describes the design and evaluation of AdHoc extensions to the IEEE 802.15.3 Medium Access Control (MAC) layer for Wireless Personal Area Networks (WPANs). The proposed ...
Samir Datta, Ivan Seskar, Mustafa Demirhan, Siun-C...
136
Voted
LCN
2003
IEEE
15 years 10 months ago
Characterization of the Burst Stabilization Protocol for the RR/RR CICQ Switch
Input buffered switches with Virtual Output Queueing (VOQ) can be unstable when presented with unbalanced loads. Existing scheduling algorithms, including iSLIP for Input Queued (...
Neil J. Gunther, Kenneth J. Christensen, Kenji Yos...
INFOCOM
2002
IEEE
15 years 10 months ago
A Congestion Control Algorithm for Tree-based Reliable Multicast Protocols
— This paper contains a detailed description of the congestion control algorithm of TRAM, a tree-based reliable multicast protocol. This algorithm takes advantage of regular ackn...
Dah-Ming Chiu, Miriam Kadansky, Joe Provino, Josep...
153
Voted
RSP
1998
IEEE
15 years 9 months ago
Reusable Architecture Templates and Automatic Specification Mapping for the Efficient Implementation of ATM Protocols
This paper presents an algorithm for the automatic mapping of problem specifications to existing architecture templates. The proposed methodology supports the combination of exist...
Nikos S. Voros, Evaggelinos P. Mariatos, Michael K...