Sciweavers

1080 search results - page 68 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
SAINT
2008
IEEE
15 years 4 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
GLOBECOM
2007
IEEE
15 years 4 months ago
Improving Packet Delivery Performance of BGP During Large-Scale Failures
— The border gateway protocol (BGP) is known to take a long time to converge to a steady state following the failure of BGP routers or inter-router links. This has resulted in ex...
Amit Sahoo, Krishna Kant, Prasant Mohapatra
TMC
2008
112views more  TMC 2008»
14 years 10 months ago
Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control (MAC) protocol. However, very little has been done on investigating the interplay betw...
Raffaele Bruno, Marco Conti, Enrico Gregori
TOCS
1998
114views more  TOCS 1998»
14 years 9 months ago
Performance Evaluation of the Orca Shared-Object System
Orca is a portable, object-based distributed shared memory system. This paper studies and evaluates the design choices made in the Orca system and compares Orca with other DSMs. T...
Henri E. Bal, Raoul Bhoedjang, Rutger F. H. Hofman...
WWW
2002
ACM
15 years 10 months ago
Aliasing on the world wide web: prevalence and performance implications
Aliasing occurs in Web transactions when requests containing different URLs elicit replies containing identical data payloads. Conventional caches associate stored data with URLs ...
Terence Kelly, Jeffrey C. Mogul