• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,070
Next 10 →

Capacity of Ad Hoc Wireless Networks

by Jinyang Li, Charles Blake, Douglas S. J. De Couto, Hu Imm Lee, Robert Morris
"... Early simulation experience with wireless ad hoc networks suggests that their capacity can be surprisingly low, due to the requirement that nodes forward each others’ packets. The achievable capacity depends on network size, traffic patterns, and detailed local radio interactions. This paper examine ..."
Abstract - Cited by 636 (14 self) - Add to MetaCart
forwarding and the effect on capacity for several simple configurations and traffic patterns. While 802.11 discovers reasonably good schedules, we nonetheless observe capacities markedly less than optimal for very simple chain and lattice networks with very regular traffic patterns. We validate some

LIFE CYCLE ASSESSMENT OF MEANS OF TRANSPORT FOR GOODS TRAFFIC

by Hildegund Mötzl, Hildegund Mötzl
"... 26-01-2009 26-01-09 2 H.Mötzl ..."
Abstract - Add to MetaCart
26-01-2009 26-01-09 2 H.Mötzl

The Performance of TCP/IP for Networks with High Bandwidth-Delay Products and Random Loss.

by Member, IEEE T V Lakshman , Senior Member, IEEE Upamanyu Madhow - IEEE/ACM Trans. Networking, , 1997
"... Abstract-This paper examines the performance of TCP/IP, the Internet data transport protocol, over wide-area networks (WANs) in which data traffic could coexist with real-time traffic such as voice and video. Specifically, we attempt to develop a basic understanding, using analysis and simulation, ..."
Abstract - Cited by 465 (6 self) - Add to MetaCart
Abstract-This paper examines the performance of TCP/IP, the Internet data transport protocol, over wide-area networks (WANs) in which data traffic could coexist with real-time traffic such as voice and video. Specifically, we attempt to develop a basic understanding, using analysis and simulation

Analyzing Peer-to-Peer Traffic Across Large Networks

by Subhabrata Sen, Jia Wang - IEEE/ACM Transactions on Networking , 2002
"... Abstract—The use of peer-to-peer (P2P) applications is growing dramatically, particularly for sharing large video/audio files and software. In this paper, we analyze P2P traffic by measuring flowlevel information collected at multiple border routers across a large ISP network, and report our investi ..."
Abstract - Cited by 383 (3 self) - Add to MetaCart
). All three P2P systems exhibit significant dynamics at short time scale and particularly at the IP address level. Still, the fraction of P2P traffic contributed by each prefix is more stable than the corresponding distribution of either Web traffic or overall traffic. The high volume and good stability

High-Rate Codes that are Linear in Space and Time

by Babak Hassibi, Bertrand Hochwald - IEEE Trans. Inform. Theory , 2000
"... Multiple-antenna systems that operate at high rates require simple yet effective space-time transmission schemes to handle the large traffic volume in real time. At rates of tens of bits/sec/Hz, V-BLAST, where every antenna transmits its own independent substream of data, has been shown to have good ..."
Abstract - Cited by 422 (13 self) - Add to MetaCart
Multiple-antenna systems that operate at high rates require simple yet effective space-time transmission schemes to handle the large traffic volume in real time. At rates of tens of bits/sec/Hz, V-BLAST, where every antenna transmits its own independent substream of data, has been shown to have

DRAFT GOODS TRAFFIC ON HIGH SPEED RAILWAY LINE BETWEEN LISBON AND MADRID

by Diana Silva Leal, Diana Silva Leal , 2009
"... The content in this paper is in pre-published, draft form. It has not been peer-reviewed and should be used for informational purposes only. The authors warn that the paper may contain typos, misquotes, incomplete, and possibly incorrect content. It is intended that the paper will be revised and ele ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
The content in this paper is in pre-published, draft form. It has not been peer-reviewed and should be used for informational purposes only. The authors warn that the paper may contain typos, misquotes, incomplete, and possibly incorrect content. It is intended that the paper will be revised and elevated to “published ” status, at which point the quality caveat will be lifted. seari.mit.edu SEAri WP-2009-3-1

Characteristics of WWW Client-based Traces

by Carlos R. Cunha, Azer Bestavros, Mark E. Crovella , 1995
"... The explosion of WWW traffic necessitates an accurate picture of WWW use, and in particular requires a good understanding of client requests for WWW documents. To address this need, we have collectedtraces of actual executions of NCSA Mosaic, reflecting over half a million user requests for WWW docu ..."
Abstract - Cited by 313 (31 self) - Add to MetaCart
The explosion of WWW traffic necessitates an accurate picture of WWW use, and in particular requires a good understanding of client requests for WWW documents. To address this need, we have collectedtraces of actual executions of NCSA Mosaic, reflecting over half a million user requests for WWW

An Integrated Congestion Management Architecture for Internet Hosts

by Hari Balakrishnan, Hariharan S. Rahul, Srinivasan Seshan - In Proc. ACM SIGCOMM , 1999
"... This paper presents a novel framework for managing network congestion from an end-to-end perspective. Our work is motivated by several trends in traffic patterns that threaten the long-term stability of the Internet. These trends include the use of multiple independent concurrent flows by Web app ..."
Abstract - Cited by 295 (24 self) - Add to MetaCart
This paper presents a novel framework for managing network congestion from an end-to-end perspective. Our work is motivated by several trends in traffic patterns that threaten the long-term stability of the Internet. These trends include the use of multiple independent concurrent flows by Web

Traffic Matrix Estimation: Existing Techniques and New Directions

by A. Medina , N. Taft , K. Salamatian , S. Bhattacharyya , C. Diot , 2002
"... Very few techniques have been proposed for estimating traffic matrices in the context of Internet traffic. Our work on POP-to-POP traffic matrices (TM) makes two contributions. The primary contribution is the outcome of a detailed comparative evaluation of the three existing techniques. We evaluate ..."
Abstract - Cited by 208 (14 self) - Add to MetaCart
Very few techniques have been proposed for estimating traffic matrices in the context of Internet traffic. Our work on POP-to-POP traffic matrices (TM) makes two contributions. The primary contribution is the outcome of a detailed comparative evaluation of the three existing techniques. We evaluate

Traffic engineering with traditional IP routing protocols

by Bernard Fortz, Jennifer Rexford, Mikkel Thorup - IEEE Communications Magazine , 2002
"... Traffic engineering involves adapting the routing of traffic to the network conditions, with the joint goals of good user performance and efficient use of network resources. In this paper, we describe an approach to intradomain traffic engineering that works within the existing deployed base of Inte ..."
Abstract - Cited by 182 (21 self) - Add to MetaCart
Traffic engineering involves adapting the routing of traffic to the network conditions, with the joint goals of good user performance and efficient use of network resources. In this paper, we describe an approach to intradomain traffic engineering that works within the existing deployed base
Next 10 →
Results 1 - 10 of 3,070
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University