Sciweavers

1080 search results - page 62 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
WIMOB
2007
IEEE
15 years 4 months ago
The Analysis of the Optimal Periodic Ranging Slot Number in IEEE 802.16 OFDMA Systems
As part of the IEEE 802.16 protocol, the random access scheme is used for ranging. The ratio between the numbers of periodic ranging slots and data slots in the uplink subframe de...
Jihua Zhou, Xin Jin, Jiangtao Dong, Jinglin Shi, Z...
ECBS
2008
IEEE
86views Hardware» more  ECBS 2008»
15 years 4 months ago
A Formal Model for Network-Wide Security Analysis
Network designers perform challenging tasks with so many configuration options that it is often hard or even impossible for a human to predict all potentially dangerous situation...
Petr Matousek, Jaroslav Ráb, Ondrej Rysavy,...
PAM
2012
Springer
13 years 5 months ago
Xunlei: Peer-Assisted Download Acceleration on a Massive Scale
Abstract. We take a close look at Xunlei, an enormously popular download acceleration application in China. Xunlei forms a complex ecosystem, with Xunlei peers extensively interact...
Prithula Dhungel, Keith W. Ross, Moritz Steiner, Y...
GLOBECOM
2006
IEEE
15 years 4 months ago
Service Differentiation by a Link Layer Protocol Based on SR ARQ over a Satellite Channel
— This paper studies the case where multiple IP flows are aggregated over a single satellite channel and an error recovery by retransmissions is performed by SelectiveRepeat (SR...
Toshihiro Shikama, Takashi Watanabe, Tadanori Mizu...
SPIN
2010
Springer
14 years 8 months ago
Combining SPIN with ns-2 for Protocol Optimization
In the field of communication networks, protocol engineers usually employ several tools focused on specific kinds of analysis, such as performance or correctness. This paper pres...
Pedro Merino, Alberto Salmeron