Results 1 - 10
of
438
Self-Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level
- IEEE/ACM TRANSACTIONS ON NETWORKING
, 1997
"... A number of recent empirical studies of traffic measurements from a variety of working packet networks have convincingly demonstrated that actual network traffic is self-similar or long-range dependent in nature (i.e., bursty over a wide range of time scales) -- in sharp contrast to commonly made tr ..."
Abstract
-
Cited by 743 (24 self)
- Add to MetaCart
A number of recent empirical studies of traffic measurements from a variety of working packet networks have convincingly demonstrated that actual network traffic is self-similar or long-range dependent in nature (i.e., bursty over a wide range of time scales) -- in sharp contrast to commonly made
XORs in the air: practical wireless network coding
- In Proc. ACM SIGCOMM
, 2006
"... This paper proposes COPE, a new architecture for wireless mesh networks. In addition to forwarding packets, routers mix (i.e., code) packets from different sources to increase the information content of each transmission. We show that intelligently mixing packets increases network throughput. Our de ..."
Abstract
-
Cited by 548 (20 self)
- Add to MetaCart
This paper proposes COPE, a new architecture for wireless mesh networks. In addition to forwarding packets, routers mix (i.e., code) packets from different sources to increase the information content of each transmission. We show that intelligently mixing packets increases network throughput. Our
A generalized processor sharing approach to flow control in integrated services networks: The single-node case
- IEEE/ACM TRANSACTIONS ON NETWORKING
, 1993
"... The problem of allocating network resources to the users of an integrated services network is investigated in the context of rate-based flow control. The network is assumed to be a virtual circuit, connection-based packet network. We show that the use of Generalized processor Sharing (GPS), when co ..."
Abstract
-
Cited by 2010 (5 self)
- Add to MetaCart
, the performance of a single-server GPS system is analyzed exactly from the standpoint of worst-case packet delay and burstiness when the sources are constrained by leaky buckets. The worst-case session backlogs are also determined. In the sequel to this paper, these results are extended to arbitrary topology
X-mac: A short preamble mac protocol for duty-cycled wireless sensor networks
- in SenSys
, 2006
"... In this paper we present X-MAC, a low power MAC protocol for wireless sensor networks (WSNs). Standard MAC protocols developed for duty-cycled WSNs such as B-MAC, which is the default MAC protocol for TinyOS, employ an extended preamble and preamble sampling. While this “low power listening ” approa ..."
Abstract
-
Cited by 360 (0 self)
- Add to MetaCart
significantly reduces energy usage at both the transmitter and receiver, reduces per-hop latency, and offers additional advantages such as flexible adaptation to both bursty and periodic sensor data sources.
Distributed coding of sources with bursty correlation
- in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP
, 2012
"... ABSTRACT This paper focuses on the performance of a Wyner-Ziv coding scheme for which the correlation between the source and the side information is modeled by a hidden Markov model with Gaussian emission. Such a signal model takes the memory of the correlation into account and is hence able to des ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
to describe the bursty nature of the correlation between sources in applications such as sensor networks, video coding etc. This paper provides bounds on the rate-distortion performance of a Wyner-Ziv coding scheme for such model. It proposes a practical coding scheme able to exploit the memory
Performance of ERICA and QFC for Transporting Bursty TCP Sources with Bursty Interfering Traffic
"... In ATM networks, the Available Bit Rate (ABR) service enables data sources to efficiently utilize network resources without adversely affecting the performance of non-ABR, guaranteed traffic such as video. Most research to date on ABR performance has not used realistic assumptions. Unrealistic as ..."
Abstract
- Add to MetaCart
that the performance may be significantly better with QFC than previously thought when bursty traffic sources and bursty interfering traffic is considered. Keywords: TCP, ATM, ABR, ERICA, QFC, Internet 1
DATA NETWORK MODELS OF BURSTINESS
, 2005
"... Abstract. We review characteristics of data traffic which we term stylized facts: burstiness, long range dependence, heavy tails, bursty behavior determined by high bandwidth users, dependence determined by users without high transmission rates. We propose an infinite source Poisson input model whic ..."
Abstract
- Add to MetaCart
Abstract. We review characteristics of data traffic which we term stylized facts: burstiness, long range dependence, heavy tails, bursty behavior determined by high bandwidth users, dependence determined by users without high transmission rates. We propose an infinite source Poisson input model
ABSTRACT On the Bursty Evolution of Blogspace
"... We propose two new tools to address the evolution of hyperlinked corpora. First, we define time graphs to extend the traditional notion of an evolving directed graph, capturing link creation as a point phenomenon in time. Second, we develop definitions and algorithms for time-dense community trackin ..."
Abstract
- Add to MetaCart
structure and connectedness. This expansion shows no sign of abating, although measures of connectedness must plateau within two years. By randomizing link destinations in Blogspace, but retaining sources and timestamps, we introduce a concept of randomized Blogspace. Herein, we observe similar evolution
Adaptive Packet Routing for Bursty Adversarial Traffic
, 1998
"... One of the central tasks of networking is packet-routing when edge bandwidth is limited. Tremendous progress has been achieved by separating the issue of routing into two conceptual sub-problems: path selection and congestion resolution along the selected paths. However, this conceptual separatio ..."
Abstract
-
Cited by 62 (7 self)
- Add to MetaCart
separation has a serious drawback: each packet's path is fixed at the source and cannot be modified adaptively en-route. The problem is especially severe when packet injections are modeled by an adversary, whose goal is to cause "traffic-jams".
Efficient Algorithms for Computation of the Burstiness Curve of Video Sources
, 1998
"... The burstiness of a video source can be charachterized by its burstiness curve... this paper, we present deterministic algorithms for exact computation of the burstiness curve of a video source, for both elementary video streams and MPEG-2 Transport Streams. The algorithms exploit the piecewise line ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
The burstiness of a video source can be charachterized by its burstiness curve... this paper, we present deterministic algorithms for exact computation of the burstiness curve of a video source, for both elementary video streams and MPEG-2 Transport Streams. The algorithms exploit the piecewise
Results 1 - 10
of
438