Abstract
No abstract available.
Cited By
- Beck M (2019). On the hourglass model, Communications of the ACM, 62:7, (48-57), Online publication date: 24-Jun-2019.
- Shaheen S, Khannum A, Akram M, Khan S, Seo S and Javed M (2016). Evaluating the significance of error checksums for wireless video streaming, Multimedia Tools and Applications, 75:22, (14759-14781), Online publication date: 1-Nov-2016.
- Yayah A, Coulibaly Y, Ismail A and Rouskas G (2016). Hybrid offset-time and burst assembly algorithm H-OTBA for delay sensitive applications over optical burst switching networks, International Journal of Communication Systems, 29:2, (251-261), Online publication date: 25-Jan-2016.
- Babu E, Nagaraju C and Prasad M A Secure Routing Protocol against Heterogeneous Attacks in Wireless Adhoc Networks Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, (339-344)
- Peng Y, Song Q, Yu Y and Wang F (2014). Fault-tolerant routing mechanism based on network coding in wireless mesh networks, Journal of Network and Computer Applications, 37, (259-272), Online publication date: 1-Jan-2014.
- Rabanal P, Rodríguez I and Rubio F (2013). An ACO-RFD hybrid method to solve NP-complete problems, Frontiers of Computer Science: Selected Publications from Chinese Universities, 7:5, (729-744), Online publication date: 1-Oct-2013.
- Altarawneh R and Humayoun S A Two-Perspective Visualization Approach for Utilizing Visualization Power in Computer Science Education Proceedings of the 3rd Computer Science Education Research Conference on Computer Science Education Research, (85-91)
- Theodouli A and Gounaris A Adaptive memory-aware chunk sizing techniques for data-intensive queries over web services Proceedings of the 28th Annual ACM Symposium on Applied Computing, (826-831)
- Sreenu G and Dhanya P Inference of peer temperament in unstructured peer-to-peer networks by creating a virtual multi layer structure Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (405-408)
- Jerkins J MINA Proceedings of the 50th annual ACM Southeast Conference, (7-12)
- Casas P, Nñerola M and Juan A Using specification and description language to represent users' profiles in OMNET++ simulations Proceedings of the 2011 Symposium on Theory of Modeling & Simulation: DEVS Integrative M&S Symposium, (221-228)
- Wang Y and Gaspes V An embedded language for programming protocol stacks in embedded systems Proceedings of the 20th ACM SIGPLAN workshop on Partial evaluation and program manipulation, (63-72)
- Vosoughi A, Bilal K, Khan S, Min-Allah N, Li J, Ghani N, Bouvry P and Madani S A multidimensional robust greedy algorithm for resource path finding in large-scale distributed networks Proceedings of the 8th International Conference on Frontiers of Information Technology, (1-6)
- Luh H, Wang C and Lin C Dropping behavior of a random early detection mechanism by a queueing model of batch arrivals and multiple servers Proceedings of the 5th International Conference on Queueing Theory and Network Applications, (67-74)
- Tang X, Li K, Liao G and Li R (2010). List scheduling with duplication for heterogeneous computing systems, Journal of Parallel and Distributed Computing, 70:4, (323-329), Online publication date: 1-Apr-2010.
- Sturgeon T, Allison C and Miller A Exploring 802.11 Proceedings of the 39th IEEE international conference on Frontiers in education conference, (907-912)
- Rabanal P and Rodríguez I Hybridizing river formation dynamics and ant colony optimization Proceedings of the 10th European conference on Advances in artificial life: Darwin meets von Neumann - Volume Part II, (424-431)
- Allison C, Miller A, Oliver I and Sturgeon T Global Connections for Lasting Impressions Proceedings of the 8th International Conference on Advances in Web Based Learning, (48-57)
- Qi Y, Hoshyar R and Tafazolli R On the performance of HARQ with hybrid relaying schemes Proceedings of the 2009 IEEE international conference on Communications, (4357-4362)
- Yu M and Leung K (2009). A trustworthiness-based QoS routing protocol for wireless ad hoc networks, IEEE Transactions on Wireless Communications, 8:4, (1888-1898), Online publication date: 1-Apr-2009.
- Zou X, Bhanu B and Roy-Chowdhury A (2009). Continuous learning of a multilayered network topology in a video camera network, Journal on Image and Video Processing, 2009, (1-1), Online publication date: 1-Jan-2009.
- Agarwal P and Prabhakaran B Tamper proofing mechanisms for motion capture data Proceedings of the 10th ACM workshop on Multimedia and security, (91-100)
- Singhal H and Michailidis G (2008). Optimal sampling in state space models with applications to network monitoring, ACM SIGMETRICS Performance Evaluation Review, 36:1, (145-156), Online publication date: 12-Jun-2008.
- Singhal H and Michailidis G Optimal sampling in state space models with applications to network monitoring Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (145-156)
- Ergin M, Gruteser M, Luo L, Raychaudhuri D and Liu H (2008). Available bandwidth estimation and admission control for QoS routing in wireless mesh networks, Computer Communications, 31:7, (1301-1317), Online publication date: 1-May-2008.
- Phanishayee A, Krevat E, Vasudevan V, Andersen D, Ganger G, Gibson G and Seshan S Measurement and analysis of TCP throughput collapse in cluster-based storage systems Proceedings of the 6th USENIX Conference on File and Storage Technologies, (1-14)
- Usha M and Banu R (2007). A proactive mechanism for quality of service control in high speed networks, International Journal of Business Information Systems, 2:3, (312-327), Online publication date: 1-Nov-2007.
- Patel R, Benaissa M and Boussakta S (2007). Fast Parallel-Prefix Architectures for Modulo 2n-1 Addition with a Single Representation of Zero, IEEE Transactions on Computers, 56:11, (1484-1492), Online publication date: 1-Nov-2007.
- Darabkh K and Aygün R (2007). TCP traffic control evaluation and reduction over wireless networks using parallel sequential decoding mechanism, EURASIP Journal on Wireless Communications and Networking, 2007:3, (1-10), Online publication date: 1-Jul-2007.
- Mallada E and Paganini F Optimal congestion control with multipath routing using TCP-FAST and a variant of RIP Proceedings of the 1st EuroFGI international conference on Network control and optimization, (205-214)
- Hamid N (2007). A lightweight framework for peer-to-peer programming, Journal of Computing Sciences in Colleges, 22:5, (98-104), Online publication date: 1-May-2007.
- Oh S and Fox G (2007). Optimizing Web Service messaging performance in mobile computing, Future Generation Computer Systems, 23:4, (623-632), Online publication date: 1-May-2007.
- Stann F, Heidemann J, Shroff R and Murtaza M RBP Proceedings of the 4th international conference on Embedded networked sensor systems, (85-98)
- Loo B, Condie T, Garofalakis M, Gay D, Hellerstein J, Maniatis P, Ramakrishnan R, Roscoe T and Stoica I Declarative networking Proceedings of the 2006 ACM SIGMOD international conference on Management of data, (97-108)
- Riabov V (2006). Challenging projects and virtual labs in web-enhanced networking technology classes, Journal of Computing Sciences in Colleges, 21:6, (88-99), Online publication date: 1-Jun-2006.
- Winters T, Ausanka-Crues R, Kegel M, Shimshock E, Turner D and Erlinger M TinkerNet Proceedings of the 8th Australasian Conference on Computing Education - Volume 52, (253-259)
- Loo B, Hellerstein J, Stoica I and Ramakrishnan R (2005). Declarative routing, ACM SIGCOMM Computer Communication Review, 35:4, (289-300), Online publication date: 1-Oct-2005.
- Al-Kabir Z, Le K and Sharma D MEDADVIS Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II, (789-795)
- Nickerson J (2005). A Concept of Communication Distance and Its Application to Six Situations in Mobile Environments, IEEE Transactions on Mobile Computing, 4:5, (409-419), Online publication date: 1-Sep-2005.
- Loo B, Hellerstein J, Stoica I and Ramakrishnan R Declarative routing Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, (289-300)
- Lam R, Chan H, Dillon T, Li V and Leung V (2005). Integrating connectionless and connection-oriented traffic using quantum packets, Computer Communications, 28:8, (898-907), Online publication date: 1-May-2005.
- Conti M, Gregori E and Lapenna W (2005). Client-side content delivery policies in replicated web services, Performance Evaluation, 59:2-3, (137-157), Online publication date: 1-Feb-2005.
- Pagli L, Prencipe G and Zuva T Distributed computation for swapping a failing edge Proceedings of the 6th international conference on Distributed Computing, (28-39)
- Flocchini P, Pagli L, Prencipe G, Santoro N, Widmayer P and Zuva T Computing all the best swap edges distributively Proceedings of the 8th international conference on Principles of Distributed Systems, (154-168)
- Kar D (2004). Network measurement and path characterization using user datagram protocol, Journal of Computing Sciences in Colleges, 19:4, (321-328), Online publication date: 1-Apr-2004.
Index Terms
- Computer Networks: A Systems Approach, 3rd Edition
Please enable JavaScript to view thecomments powered by Disqus.