Results 1 - 10
of
1,912
Congestion control for high bandwidth-delay product networks
- SIGCOMM '02
, 2002
"... Theory and experiments show that as the per-flow product of bandwidth and latency increases, TCP becomes inefficient and prone to instability, regardless of the queuing scheme. This failing becomes increasingly important as the Internet evolves to incorporate very high-bandwidth optical links and mo ..."
Abstract
-
Cited by 454 (4 self)
- Add to MetaCart
Theory and experiments show that as the per-flow product of bandwidth and latency increases, TCP becomes inefficient and prone to instability, regardless of the queuing scheme. This failing becomes increasingly important as the Internet evolves to incorporate very high-bandwidth optical links
Tinysec: A link layer security architecture for wireless sensor networks
- in Proc of the 2nd Int’l Conf on Embedded Networked Sensor Systems
"... We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vulnerabilities in security protocols for other wireless networks such as 802.11b and GSM. Conventional security protocols te ..."
Abstract
-
Cited by 521 (0 self)
- Add to MetaCart
the tradeoffs among different cryptographic primitives and use the inherent sensor network limitations to our advantage when choosing parameters to find a sweet spot for security, packet overhead, and resource requirements. TinySec is portable to a variety of hardware and radio platforms. Our experimental
On µ-kernel construction
- Symposium on Operating System Principles
, 1995
"... From a software-technology point of view, the-kernel concept is superior to large integrated kernels. On the other hand, it is widely believed that (a)-kernel based systems are inherently inefficient and (b) they are not sufficiently flexible. Contradictory to this belief, we show and support by doc ..."
Abstract
-
Cited by 429 (25 self)
- Add to MetaCart
From a software-technology point of view, the-kernel concept is superior to large integrated kernels. On the other hand, it is widely believed that (a)-kernel based systems are inherently inefficient and (b) they are not sufficiently flexible. Contradictory to this belief, we show and support
Distributed Quality-of-Service Routing in Ad-Hoc Networks
- IEEE Journal on Selected Areas in Communications
, 1999
"... In an ad-hoc network, all communication is done over wireless media, typically by radio through air, without the help of wired base stations. Since direct communication is allowed only between adjacent nodes, distant nodes communicate over multiple hops. The quality-ofservice (QoS) routing in an ad- ..."
Abstract
-
Cited by 299 (4 self)
- Add to MetaCart
-hoc network is difficult because the network topology may change constantly and the available state information for routing is inherently imprecise. In this paper, we propose a distributed QoS routing scheme which selects a network path with sucient resources to satisfy certain delay (or bandwidth
Visual Information Retrieval
, 1997
"... ND BUSINESSMAN CALVIN MOORES COINED the term information retrieval [10] to describe the process through which a prospective user of information can convert a request for information into a useful collection of references. "Information retrieval," he wrote, "embraces the intellectual a ..."
Abstract
-
Cited by 283 (2 self)
- Add to MetaCart
: The information sought is inherently in the form of imagery that a textual language, however powerful, is unable to express adequately, making query processing inefficient. HE ROLE OF THE EMERGING FIELD OF visual information retrieval (VIR) systems is to go beyond text-based descri
The Social Cost of Cheap Pseudonyms
- Journal of Economics and Management Strategy
, 2000
"... We consider the problems of societal norms for cooperation and reputation when it is possible to obtain "cheap pseudonyms", something which is becoming quite common in a wide variety of interactions on the Internet. This introduces opportunities to misbehave without paying reputational con ..."
Abstract
-
Cited by 273 (10 self)
- Add to MetaCart
consequences. A large degree of cooperation can still emerge, through a convention in which newcomers "pay their dues" by accepting poor treatment from players who have established positive reputations. One might hope for an open society where newcomers are treated well, but there is an inherent
Bandwidth
, 2009
"... Monotonicity of the equilibrium bidding strategy is a key property of structural auction models. Traditional nonparametric estimators provide a flexible means of uncovering salient features of auction data, but do not formally impose the monotonicity assumption that is inherent in the models during ..."
Abstract
- Add to MetaCart
Monotonicity of the equilibrium bidding strategy is a key property of structural auction models. Traditional nonparametric estimators provide a flexible means of uncovering salient features of auction data, but do not formally impose the monotonicity assumption that is inherent in the models during
Cognitive multiple access via cooperation: Protocol design and performance analysis
- IEEE Trans. on Information Theory
, 2007
"... Abstract—In this paper, a novel cognitive multiple-access strategy in the presence of a cooperating relay is proposed. Exploiting an important phenomenon in wireless networks, source burstiness, the cognitive relay utilizes the periods of silence of the terminals to enable cooperation. Therefore, no ..."
Abstract
-
Cited by 77 (24 self)
- Add to MetaCart
degradation in the maximum stable throughput with increasing the required rate of communication. On the other hand, conventional relaying strategies suffer from catastrophic performance degradation because of their inherent bandwidth inefficiency that results from allocating specific channel resources
Internet Congestion Control for Future High Bandwidth-Delay Product Environments
- ACM SIGCOMM
, 2002
"... Theory and experiments show that as the per-flow product of bandwidth and latency increases, TCP becomes inefficient and prone to instability, regardless of the queuing scheme. This failing becomes increasingly important as the Internet evolves to incorporate very high-bandwidth optical links and mo ..."
Abstract
-
Cited by 130 (0 self)
- Add to MetaCart
Theory and experiments show that as the per-flow product of bandwidth and latency increases, TCP becomes inefficient and prone to instability, regardless of the queuing scheme. This failing becomes increasingly important as the Internet evolves to incorporate very high-bandwidth optical links
Jigsaw: Solving the puzzle of enterprise 802.11 analysis
- In SIGCOMM
, 2006
"... The combination of unlicensed spectrum, cheap wireless interfaces and the inherent convenience of untethered computing have made 802.11-based networks ubiquitous in the enterprise. Modern universities, corporate campuses and government offices routinely deploy scores of access points to blanket thei ..."
Abstract
-
Cited by 174 (12 self)
- Add to MetaCart
The combination of unlicensed spectrum, cheap wireless interfaces and the inherent convenience of untethered computing have made 802.11-based networks ubiquitous in the enterprise. Modern universities, corporate campuses and government offices routinely deploy scores of access points to blanket
Results 1 - 10
of
1,912