Sciweavers

2349 search results - page 321 / 470
» Performing time-sensitive network experiments
Sort
View
134
Voted
ACMACE
2004
ACM
15 years 9 months ago
A synthetic traffic model for Quake3
This paper presents our development of a synthetic traffic model for the interactive online computer game Quake3. The goal is a traffic model that can be used by researchers and I...
Tanja Lang, Philip Branch, Grenville J. Armitage
108
Voted
DMSN
2004
ACM
15 years 9 months ago
Predictive filtering: a learning-based approach to data stream filtering
Recent years have witnessed an increasing interest in filtering of distributed data streams, such as those produced by networked sensors. The focus is to conserve bandwidth and se...
Vibhore Kumar, Brian F. Cooper, Shamkant B. Navath...
149
Voted
WMASH
2003
ACM
15 years 9 months ago
Wireless hotspots: current challenges and future directions
In recent years, wireless Internet service providers (WISPs) have established Wi-Fi hotspots in increasing numbers at public venues, providing local coverage to traveling users an...
Anand Balachandran, Geoffrey M. Voelker, Paramvir ...
134
Voted
INFOCOM
2002
IEEE
15 years 8 months ago
SAVE: Source Address Validity Enforcement Protocol
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...
162
Voted
CONEXT
2007
ACM
15 years 7 months ago
Router buffer sizing revisited: the role of the output/input capacity ratio
The issue of router buffer sizing is still open and significant. Previous work either considers open-loop traffic or only analyzes persistent TCP flows. This paper differs in two ...
Ravi S. Prasad, Constantine Dovrolis, Marina Thott...