Sciweavers

352 search results - page 36 / 71
» Proof-Checking a Data Link Protocol
Sort
View
WS
2004
ACM
15 years 5 months ago
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with du...
Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-...
AINA
2010
IEEE
15 years 3 months ago
Applying TCP-Friendly Congestion Control to Concurrent Multipath Transfer
Abstract--The steadily growing importance of Internetbased applications and their resilience requirements lead to a rising number of multi-homed sites. The idea of Concurrent Multi...
Thomas Dreibholz, Martin Becke, Jobin Pulinthanath...
CN
2004
98views more  CN 2004»
14 years 11 months ago
Considering spurious timeout in proxy for improving TCP performance in wireless networks
In this paper, we introduce a new proxy that effectively prevents unnecessary retransmissions of Transmission Control Protocol data segments from flowing over a wireless link on a...
Yu-Chul Kim, Dong-Ho Cho
INFOCOM
2003
IEEE
15 years 5 months ago
MEDF - A Simple Scheduling Algorithm for Two Real-Time Transport Service Classes with Application in the UTRAN
— In this paper, we consider real-time speech traffic, real-time circuit-switched data (CSD) and non-real-time packetswitched data (PSD) in the UMTS Terrestrial Radio Access Net...
Michael Menth, Matthias Schmid, Herbert Heiss, Tho...
ISCC
2008
IEEE
105views Communications» more  ISCC 2008»
15 years 6 months ago
VoRaQue: Range queries on Voronoi overlays
—This paper presents VoRaQue, a software layer supporting range queries on Voronoi P2P overlays. VoRaQue maps data in a 2-dimensional space. The P2P overlay is defined by links ...
Michele Albano, Laura Ricci, Martina Baldanzi, Ran...