• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

DMCA

Adaptive Packet Routing for Bursty Adversarial Traffic (1998)

Cached

  • Download as a PDF

Download Links

  • [www.cs.technion.ac.il]
  • [gsyc032.dat.escet.urjc.es]
  • [www.argreenhouse.com]
  • [www.cs.technion.ac.il]
  • [www.argreenhouse.com]
  • [www.cs.ucla.edu]
  • [www.math.ucla.edu]
  • [www.cs.ucla.edu]
  • [web.cs.ucla.edu]
  • [www.cs.technion.ac.il]
  • [www.lri.fr]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by William Aiello , Eyal Kushilevitz , Rafail Ostrovsky , Adi Rosen
Citations:61 - 6 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Aiello98adaptivepacket,
    author = {William Aiello and Eyal Kushilevitz and Rafail Ostrovsky and Adi Rosen},
    title = {Adaptive Packet Routing for Bursty Adversarial Traffic},
    year = {1998}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

One of the central tasks of networking is packet-routing when edge bandwidth is limited. Tremendous progress has been achieved by separating the issue of routing into two conceptual sub-problems: path selection and congestion resolution along the selected paths. However, this conceptual separation has a serious drawback: each packet's path is fixed at the source and cannot be modified adaptively en-route. The problem is especially severe when packet injections are modeled by an adversary, whose goal is to cause "traffic-jams".

Keyphrases

bursty adversarial traffic    adaptive packet routing    serious drawback    central task    path selection    edge bandwidth    packet injection    tremendous progress    congestion resolution    conceptual sub-problems    conceptual separation   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University