Sciweavers

144 search results - page 5 / 29
» ton 2008
Sort
View
57
Voted
JSS
2008
61views more  JSS 2008»
15 years 23 days ago
Data access in distributed simulations of multi-agent systems
Dan Chen, Roland Ewald, Georgios K. Theodoropoulos...
110
Voted
TON
2008
79views more  TON 2008»
15 years 21 days ago
Asynchronous congestion control in multi-hop wireless networks with maximal matching-based scheduling
We consider a multi-hop wireless network shared by many users. For an interference model that constrains a node to either transmit to or receive from only one other node at a time,...
Loc Bui, Atilla Eryilmaz, R. Srikant, Xinzhou Wu
90
Voted
TON
2008
105views more  TON 2008»
15 years 21 days ago
Supporting multiple protection strategies in optical networks
This paper develops a framework to support multiple protection strategies in optical networks, which is in general applicable to any connection-oriented network. The capacity avail...
Srinivasan Ramasubramanian
85
Voted
TON
2008
89views more  TON 2008»
15 years 21 days ago
Probabilistic packet marking for large-scale IP traceback
This article presents an approach to IP traceback based on the probabilistic packet marking paradigm. Our approach, which we call randomize-and-link, uses large checksum cords to &...
Michael T. Goodrich
121
Voted
TON
1998
116views more  TON 1998»
15 years 13 days ago
Explicit allocation of best-effort packet delivery service
— This paper presents the “allocated-capacity” framework for providing different levels of best-effort service in times of network congestion. The “allocatedcapacity” fra...
David D. Clark, Wenjia Fang