Sciweavers

144 search results - page 5 / 29
» ton 2008
Sort
View
JSS
2008
61views more  JSS 2008»
14 years 11 months ago
Data access in distributed simulations of multi-agent systems
Dan Chen, Roland Ewald, Georgios K. Theodoropoulos...
TON
2008
79views more  TON 2008»
14 years 11 months ago
Asynchronous congestion control in multi-hop wireless networks with maximal matching-based scheduling
We consider a multi-hop wireless network shared by many users. For an interference model that constrains a node to either transmit to or receive from only one other node at a time,...
Loc Bui, Atilla Eryilmaz, R. Srikant, Xinzhou Wu
TON
2008
105views more  TON 2008»
14 years 11 months ago
Supporting multiple protection strategies in optical networks
This paper develops a framework to support multiple protection strategies in optical networks, which is in general applicable to any connection-oriented network. The capacity avail...
Srinivasan Ramasubramanian
TON
2008
89views more  TON 2008»
14 years 11 months ago
Probabilistic packet marking for large-scale IP traceback
This article presents an approach to IP traceback based on the probabilistic packet marking paradigm. Our approach, which we call randomize-and-link, uses large checksum cords to &...
Michael T. Goodrich
TON
1998
116views more  TON 1998»
14 years 10 months ago
Explicit allocation of best-effort packet delivery service
— This paper presents the “allocated-capacity” framework for providing different levels of best-effort service in times of network congestion. The “allocatedcapacity” fra...
David D. Clark, Wenjia Fang