Sciweavers

2349 search results - page 369 / 470
» Performing time-sensitive network experiments
Sort
View
TON
2002
170views more  TON 2002»
14 years 9 months ago
The BLUE active queue management algorithms
In order to stem the increasing packet loss rates caused by an exponential increase in network traffic, the IETF has been considering the deployment of active queue management tech...
Wu-chang Feng, Kang G. Shin, Dilip D. Kandlur, Deb...
MTA
2007
110views more  MTA 2007»
14 years 9 months ago
On aggregate available bandwidth in many-to-one data transfer - modeling and applications
Abstract This work investigates the modeling of aggregate available bandwidth in multisender network applications. Unlike the well-established client–server model, where there is...
S. C. Hui, Jack Y. B. Lee
CORR
2008
Springer
140views Education» more  CORR 2008»
14 years 8 months ago
Steganography of VoIP streams
The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing exis...
Wojciech Mazurczyk, Krzysztof Szczypiorski
EDBT
2008
ACM
112views Database» more  EDBT 2008»
15 years 10 months ago
Providing freshness guarantees for outsourced databases
Database outsourcing becomes increasingly attractive as advances in network technologies eliminate the perceived performance difference between in-house databases and outsourced d...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
SOSP
2007
ACM
15 years 6 months ago
DejaView: a personal virtual computer recorder
As users interact with the world and their peers through their computers, it is becoming important to archive and later search the information that they have viewed. We present De...
Oren Laadan, Ricardo A. Baratto, Dan B. Phung, Sha...