• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,912
Next 10 →

Congestion control for high bandwidth-delay product networks

by Dina Katabi, Mark Handley, Charlie Rohrs - SIGCOMM '02 , 2002
"... Theory and experiments show that as the per-flow product of bandwidth and latency increases, TCP becomes inefficient and prone to instability, regardless of the queuing scheme. This failing becomes increasingly important as the Internet evolves to incorporate very high-bandwidth optical links and mo ..."
Abstract - Cited by 454 (4 self) - Add to MetaCart
Theory and experiments show that as the per-flow product of bandwidth and latency increases, TCP becomes inefficient and prone to instability, regardless of the queuing scheme. This failing becomes increasingly important as the Internet evolves to incorporate very high-bandwidth optical links

Tinysec: A link layer security architecture for wireless sensor networks

by Chris Karlof, Naveen Sastry, David Wagner - in Proc of the 2nd Int’l Conf on Embedded Networked Sensor Systems
"... We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vulnerabilities in security protocols for other wireless networks such as 802.11b and GSM. Conventional security protocols te ..."
Abstract - Cited by 521 (0 self) - Add to MetaCart
the tradeoffs among different cryptographic primitives and use the inherent sensor network limitations to our advantage when choosing parameters to find a sweet spot for security, packet overhead, and resource requirements. TinySec is portable to a variety of hardware and radio platforms. Our experimental

On µ-kernel construction

by Jochen Liedtke - Symposium on Operating System Principles , 1995
"... From a software-technology point of view, the-kernel concept is superior to large integrated kernels. On the other hand, it is widely believed that (a)-kernel based systems are inherently inefficient and (b) they are not sufficiently flexible. Contradictory to this belief, we show and support by doc ..."
Abstract - Cited by 429 (25 self) - Add to MetaCart
From a software-technology point of view, the-kernel concept is superior to large integrated kernels. On the other hand, it is widely believed that (a)-kernel based systems are inherently inefficient and (b) they are not sufficiently flexible. Contradictory to this belief, we show and support

Distributed Quality-of-Service Routing in Ad-Hoc Networks

by Shigang Chen, Klara Nahrstedt - IEEE Journal on Selected Areas in Communications , 1999
"... In an ad-hoc network, all communication is done over wireless media, typically by radio through air, without the help of wired base stations. Since direct communication is allowed only between adjacent nodes, distant nodes communicate over multiple hops. The quality-ofservice (QoS) routing in an ad- ..."
Abstract - Cited by 299 (4 self) - Add to MetaCart
-hoc network is difficult because the network topology may change constantly and the available state information for routing is inherently imprecise. In this paper, we propose a distributed QoS routing scheme which selects a network path with sucient resources to satisfy certain delay (or bandwidth

Visual Information Retrieval

by Amarnath Gupta, Retrieval Amarnath Gupta, Ramesh Jain , 1997
"... ND BUSINESSMAN CALVIN MOORES COINED the term information retrieval [10] to describe the process through which a prospective user of information can convert a request for information into a useful collection of references. "Information retrieval," he wrote, "embraces the intellectual a ..."
Abstract - Cited by 283 (2 self) - Add to MetaCart
: The information sought is inherently in the form of imagery that a textual language, however powerful, is unable to express adequately, making query processing inefficient. HE ROLE OF THE EMERGING FIELD OF visual information retrieval (VIR) systems is to go beyond text-based descri

The Social Cost of Cheap Pseudonyms

by Eric J. Friedman, Paul Resnick - Journal of Economics and Management Strategy , 2000
"... We consider the problems of societal norms for cooperation and reputation when it is possible to obtain "cheap pseudonyms", something which is becoming quite common in a wide variety of interactions on the Internet. This introduces opportunities to misbehave without paying reputational con ..."
Abstract - Cited by 273 (10 self) - Add to MetaCart
consequences. A large degree of cooperation can still emerge, through a convention in which newcomers "pay their dues" by accepting poor treatment from players who have established positive reputations. One might hope for an open society where newcomers are treated well, but there is an inherent

Bandwidth

by Daniel J. Henderson, John A. List, Daniel L. Millimet, Christopher F. Parmeter, Michael K. Price, Zongwu Cai, Han Hong , 2009
"... Monotonicity of the equilibrium bidding strategy is a key property of structural auction models. Traditional nonparametric estimators provide a flexible means of uncovering salient features of auction data, but do not formally impose the monotonicity assumption that is inherent in the models during ..."
Abstract - Add to MetaCart
Monotonicity of the equilibrium bidding strategy is a key property of structural auction models. Traditional nonparametric estimators provide a flexible means of uncovering salient features of auction data, but do not formally impose the monotonicity assumption that is inherent in the models during

Cognitive multiple access via cooperation: Protocol design and performance analysis

by Ahmed K. Sadek, K. J. Ray Liu, Anthony Ephremides - IEEE Trans. on Information Theory , 2007
"... Abstract—In this paper, a novel cognitive multiple-access strategy in the presence of a cooperating relay is proposed. Exploiting an important phenomenon in wireless networks, source burstiness, the cognitive relay utilizes the periods of silence of the terminals to enable cooperation. Therefore, no ..."
Abstract - Cited by 77 (24 self) - Add to MetaCart
degradation in the maximum stable throughput with increasing the required rate of communication. On the other hand, conventional relaying strategies suffer from catastrophic performance degradation because of their inherent bandwidth inefficiency that results from allocating specific channel resources

Internet Congestion Control for Future High Bandwidth-Delay Product Environments

by Dina Katabi, Mark Handley, Charlie Rohrs - ACM SIGCOMM , 2002
"... Theory and experiments show that as the per-flow product of bandwidth and latency increases, TCP becomes inefficient and prone to instability, regardless of the queuing scheme. This failing becomes increasingly important as the Internet evolves to incorporate very high-bandwidth optical links and mo ..."
Abstract - Cited by 130 (0 self) - Add to MetaCart
Theory and experiments show that as the per-flow product of bandwidth and latency increases, TCP becomes inefficient and prone to instability, regardless of the queuing scheme. This failing becomes increasingly important as the Internet evolves to incorporate very high-bandwidth optical links

Jigsaw: Solving the puzzle of enterprise 802.11 analysis

by Yu-chung Cheng, John Bellardo, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage - In SIGCOMM , 2006
"... The combination of unlicensed spectrum, cheap wireless interfaces and the inherent convenience of untethered computing have made 802.11-based networks ubiquitous in the enterprise. Modern universities, corporate campuses and government offices routinely deploy scores of access points to blanket thei ..."
Abstract - Cited by 174 (12 self) - Add to MetaCart
The combination of unlicensed spectrum, cheap wireless interfaces and the inherent convenience of untethered computing have made 802.11-based networks ubiquitous in the enterprise. Modern universities, corporate campuses and government offices routinely deploy scores of access points to blanket
Next 10 →
Results 1 - 10 of 1,912
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University