Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 06 Oct 2024Bibliometrics
Skip Table Of Content Section
article
Fit a compact spread estimator in small high-speed memory

The spread of a source host is the number of distinct destinations that it has sent packets to during a measurement period. A spread estimator is a software/hardware module on a router that inspects the arrival packets and estimates the spread of each ...

article
Throughput-competitive advance reservation with bounded path dispersion

In response to the high throughput needs of grid and cloud computing applications, several production networks have recently started to support advance reservation of dedicated circuits. An important open problem within this context is to devise advance ...

article
Cross-layer designs in coded wireless fading networks with multicast

A cross-layer design along with an optimal resource allocation framework is formulated for wireless fading networks, where the nodes are allowed to perform network coding. The aim is to jointly optimize end-to-end transport-layer rates, network code ...

article
Bilateral and multilateral exchanges for peer-assisted content distribution

Users of the BitTorrent file-sharing protocol and its variants are incentivized to contribute their upload capacity in a bilateral manner: Downloading is possible in return for uploading to the same user. An alternative is to use multilateral exchange ...

article
On routing and transmission-range determination of multi-bit-rate signals over mixed-line-rate WDM optical networks for carrier ethernet

Ethernet's success in local area networks (LANs) is fueling the efforts to extend its reach to cover metro and long-haul networks. This new Ethernet is refereed to as Carrier Ethernet. Among the various transport infrastructures for realizing Carrier ...

article
On dynamic server provisioning in multichannel P2P live streaming

To guarantee the streaming quality in live peer-to-peer (P2P) streaming channels, it is preferable to provision adequate levels of upload capacities at dedicated streaming servers, compensating for peer instability and time-varying peer upload bandwidth ...

article
Minimum maximum-degree publish-subscribe overlay network design

Designing an overlay network for publish/subscribe communication in a system where nodes may subscribe to many different topics of interest is of fundamental importance. For scalability and efficiency, it is important to keep the degree of the nodes in ...

article
Minimum data-latency-bound k-sink placement problem in wireless sensor networks

In this paper, we propose a new multiple-sink positioning problem in wireless sensor networks to best support real-time applications. We formally define this problem as the k-Sink Placement Problem (k-SPP) and prove that it is APX-complete. We show that ...

article
Delay and capacity tradeoff analysis for motioncast

In this paper, we define multicast for an ad hoc network through nodes' mobility as MotionCast and study the delay and capacity tradeoffs for it. Assuming nodes move according to an independently and identically distributed (i.i.d.) pattern and each ...

article
Efficient network-coding-based opportunistic routing through cumulative coded acknowledgments

The use of random linear network coding (NC) has significantly simplified the design of opportunistic routing (OR) protocols by removing the need of coordination among forwarding nodes for avoiding duplicate transmissions. However, NC-based OR protocols ...

article
A refined performance characterization of longest-queue-first policy in wireless networks

One of the major challenges in wireless networking is how to optimize the link scheduling decisions under interference constraints. Recently, a few algorithms have been introduced to address the problem. However, solving the problem to optimality for ...

article
A network activity classification schema and its application to scan detection

Internet traffic is neither well-behaved nor well-understood, which makes it difficult to detect malicious activities such as scanning. A large portion of scanning activity is of a slow scan type and is not currently detectable by security appliances. ...

article
Design and implementation of a fast dynamic packet filter

This paper presents Swift, a packet filter for high-performance packet capture on commercial off-the-shelf hardware. The key features of the Swift include: 1) extremely lowfilter update latency for dynamic packet filtering, and 2) gigabits-per-second ...

article
Twelve years in the evolution of the internet ecosystem

Our goal is to understand the evolution of the autonomous system (AS) ecosystem over the last 12 years. Instead of focusing on abstract topological properties, we classify ASs into a number of types depending on their function and business type. ...

article
Detecting communities in sparse MANETs

In sparse mobile ad hoc networks, placement of services and data is crucial to assure their availability to all nodes because sparse population of nodes can lead to (frequent) network partitions. If these dynamic networks display a fairly stable cluster ...

article
Defending against distance cheating in link-weighted application-layer multicast

Application-layer multicast (ALM) has recently emerged as a promising solution for diverse group-oriented applications. Unlike dedicated routers in IP multicast, the autonomous end-hosts are generally unreliable and even selfish. A strategic host might ...

article
Distributed delay-power control algorithms for bandwidth sharing in wireless networks

In this paper, we formulate a delay-power control (DPC) scheme for wireless networking, which efficiently balances delay against transmitter power on each wireless link. The DPC scheme is scalable, as each link autonomously updates its power based on ...

article
Achieving MAC-layer fairness in CSMA/CA networks

We demonstrate that CSMA/CA networks, including IEEE 802.11 networks, exhibit severe fairness problem in many scenarios, where some hosts obtain most of the channel's bandwidth while others starve. Most existing solutions require nodes to overhear ...

article
A simple critical-load-based CAC scheme for IEEE 802.11 DCF networks

This paper proposes a simple and practical call admission control (CAC) scheme for one-hop IEEE 802.11 distributed coordination function (DCF) networks in heterogeneous environments. The proposed scheme is the first CAC scheme derived from an asymptotic ...

article
A new estimation scheme for the effective number of users in internet congestion control

Many congestion control protocols have been recently proposed in order to alleviate the problems encountered by TCP in high-speed networks and wireless links. Protocols utilizing an architecture that is in the same spirit as the ABR service in ATM ...

article
Interference analysis for highly directional 60-GHz mesh networks: the case for rethinking medium access control

We investigate spatial interference statistics for multigigabit outdoor mesh networks operating in the unlicensed 60-GHz "millimeter (mm) wave" band. The links in such networks are highly directional: Because of the small carrier wavelength (an order of ...

article
Provider-customer coalitional games

Efficacy of commercial wireless networks can be substantially enhanced through large-scale cooperation among involved entities such as providers and customers. The success of such cooperation is contingent upon the design of judicious resource ...

article
On the feasibility and efficacy of protection routing in IP networks

With network components increasingly reliable, routing is playing an ever greater role in determining network reliability. This has spurred much activity in improving routing stability and reaction to failures and rekindled interest in centralized ...

article
Humans and bots in internet chat: measurement, analysis, and automated classification

The abuse of chat services by automated programs, known as chat bots, poses a serious threat to Internet users. Chat bots target popular chat networks to distribute spam and malware. In this paper, we first conduct a series of measurements on a large0 ...

Subjects

Comments