Sciweavers

2349 search results - page 321 / 470
» Performing time-sensitive network experiments
Sort
View
91
Voted
ACMACE
2004
ACM
15 years 3 months ago
A synthetic traffic model for Quake3
This paper presents our development of a synthetic traffic model for the interactive online computer game Quake3. The goal is a traffic model that can be used by researchers and I...
Tanja Lang, Philip Branch, Grenville J. Armitage
73
Voted
DMSN
2004
ACM
15 years 3 months ago
Predictive filtering: a learning-based approach to data stream filtering
Recent years have witnessed an increasing interest in filtering of distributed data streams, such as those produced by networked sensors. The focus is to conserve bandwidth and se...
Vibhore Kumar, Brian F. Cooper, Shamkant B. Navath...
WMASH
2003
ACM
15 years 3 months ago
Wireless hotspots: current challenges and future directions
In recent years, wireless Internet service providers (WISPs) have established Wi-Fi hotspots in increasing numbers at public venues, providing local coverage to traveling users an...
Anand Balachandran, Geoffrey M. Voelker, Paramvir ...
INFOCOM
2002
IEEE
15 years 3 months ago
SAVE: Source Address Validity Enforcement Protocol
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...
CONEXT
2007
ACM
15 years 2 months ago
Router buffer sizing revisited: the role of the output/input capacity ratio
The issue of router buffer sizing is still open and significant. Previous work either considers open-loop traffic or only analyzes persistent TCP flows. This paper differs in two ...
Ravi S. Prasad, Constantine Dovrolis, Marina Thott...