No abstract available.
RFC Downloads
Cited By
- Alramli O, Hanapi Z, Othman M, Ahmad I and Samian N (2024). RTTV-TCP, Ad Hoc Networks, 164:C, Online publication date: 1-Nov-2024.
- Yuan D, Zhang W, Qiu Y, Huang H, Yang M, Chen P, Xiao K, Yan H, He Y and Zhang Y (2024). Context-Aware Cross-Layer Congestion Control for Large-Scale Live Streaming, IEEE/ACM Transactions on Networking, 32:5, (3743-3759), Online publication date: 1-Oct-2024.
- Li H, Liu Y, Cheng Y, Ray S, Du K and Jiang J Eloquent: A More Robust Transmission Scheme for LLM Token Streaming Proceedings of the 2024 SIGCOMM Workshop on Networks for AI Computing, (34-40)
- Rautenstrauch J and Stock B Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, (843-855)
- Ollando R, Shin S and Briand L (2024). Learning Failure-Inducing Models for Testing Software-Defined Networks, ACM Transactions on Software Engineering and Methodology, 33:5, (1-25), Online publication date: 30-Jun-2024.
- Yang Y, Zhang Y, Wan T, Wang C, Duan H, Chen J and Li Y Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (265-276)
- Lee J, Kim M, Song W, Kim Y and Kim D Rescuing QUIC Flows From Countermeasures Against UDP Flooding Attacks Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, (1072-1080)
- Aykurt K, Zerwas J, Blenk A and Kellerer W (2023). When TCP Meets Reconfigurations: A Comprehensive Measurement Study, IEEE Transactions on Network and Service Management, 21:2, (1372-1386), Online publication date: 1-Apr-2024.
- Wang S, Xie T, Chen M, Tu G, Li C, Lei X, Chou P, Hsieh F, Hu Y, Xiao L and Peng C (2024). Dissecting Operational Cellular IoT Service Security: Attacks and Defenses, IEEE/ACM Transactions on Networking, 32:2, (1229-1244), Online publication date: 1-Apr-2024.
- Khorov E, Krasilov A, Susloparov M and Kong L (2023). Boosting TCP & QUIC Performance in mmWave, Terahertz, and Lightwave Wireless Networks: A Survey, IEEE Communications Surveys & Tutorials, 25:4, (2862-2891), Online publication date: 1-Oct-2023.
- Zhou J, Qiu X, Li Z, Li Q, Tyson G, Duan J, Wang Y, Pan H and Wu Q (2023). A Machine Learning-Based Framework for Dynamic Selection of Congestion Control Algorithms, IEEE/ACM Transactions on Networking, 31:4, (1566-1581), Online publication date: 1-Aug-2023.
- Boo J, Chung Y, Baek E, Na S, Kim C and Kim J F4T: A Fast and Flexible FPGA-based Full-stack TCP Acceleration Framework Proceedings of the 50th Annual International Symposium on Computer Architecture, (1-13)
- Li T, Chandramouli B, Burckhardt S and Madden S (2023). DARQ Matter Binds Everything: Performant and Composable Cloud Programming via Resilient Steps, Proceedings of the ACM on Management of Data, 1:2, (1-27), Online publication date: 13-Jun-2023.
- Kong D, Shen Y, Chen X, Cheng Q, Liu H, Zhang D, Liu X, Chen S and Wu C (2023). Combination Attacks and Defenses on SDN Topology Discovery, IEEE/ACM Transactions on Networking, 31:2, (904-919), Online publication date: 1-Apr-2023.
- Michel F, Cohen A, Malak D, De Coninck Q, Médard M and Bonaventure O (2023). FlEC: Enhancing QUIC With Application-Tailored Reliability Mechanisms, IEEE/ACM Transactions on Networking, 31:2, (606-619), Online publication date: 1-Apr-2023.
- Majidi A, Gao X, Zhu S, Jahanbakhsh N, Zheng J and Chen G (2022). MiFi: Bounded Update to Optimize Network Performance in Software-Defined Data Centers, IEEE/ACM Transactions on Networking, 31:1, (322-335), Online publication date: 1-Feb-2023.
- He K, Kim D and Asghar M (2023). Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey, IEEE Communications Surveys & Tutorials, 25:1, (538-566), Online publication date: 1-Jan-2023.
- Nast M, Raddatz H, Rother B, Golatowski F and Timmermann D A Survey and Comparison of Publish/Subscribe Protocols for the Industrial Internet of Things (IIoT) Proceedings of the 12th International Conference on the Internet of Things, (193-200)
- Piraux M, Barbette T, Rybowski N, Navarre L, Alfroy T, Pelsser C, Michel F and Bonaventure O (2022). The multiple roles that IPv6 addresses can play in today's internet, ACM SIGCOMM Computer Communication Review, 52:3, (10-18), Online publication date: 30-Jul-2022.
- Feng X, Li Q, Sun K, Fu C and Xu K (2021). Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID, IEEE/ACM Transactions on Networking, 30:1, (409-422), Online publication date: 1-Feb-2022.
- Nguyen M, Debroy S and Fu A (2022). Moving Target Defense-Based Denial-of-Service Mitigation in Cloud Environments, Security and Communication Networks, 2022, Online publication date: 1-Jan-2022.
- Stephens B, Grassi D, Almasi H, Ji T, Vamanan B and Akella A TCP is Harmful to In-Network Computing Proceedings of the 20th ACM Workshop on Hot Topics in Networks, (61-68)
- Zhang M, Li G, Xu L, Bai J, Xu M, Gu G and Wu J (2021). Control Plane Reflection Attacks and Defenses in Software-Defined Networks, IEEE/ACM Transactions on Networking, 29:2, (623-636), Online publication date: 1-Apr-2021.
- Rochet F, Assogba E and Bonaventure O TCPLS Proceedings of the 19th ACM Workshop on Hot Topics in Networks, (45-52)
- Chistiakov I and Yanovich Y Responsible Self-Funding in Dash Governance System Proceedings of the 2nd International Electronics Communication Conference, (67-72)
- Shen Y, Liu K, Guo Z, Zhang W, Zhang G, Aggarwal V and Chen M Freeway Proceedings of the 17th ACM International Conference on Computing Frontiers, (225-228)
- Wang W, Tian D, Meng W, Jia X, Zhao R and Ma R (2020). MSYM, Computer Networks: The International Journal of Computer and Telecommunications Networking, 168:C, Online publication date: 26-Feb-2020.
- Busany N, Maoz S and Yulazari Y Size and accuracy in model inference Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, (887-898)
- Bao L, Busany N, Lo D and Maoz S Statistical log differencing Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, (851-862)
- Polese M, Chiariotti F, Bonetto E, Rigotto F, Zanella A and Zorzi M (2019). A Survey on Recent Advances in Transport Layer Protocols, IEEE Communications Surveys & Tutorials, 21:4, (3584-3608), Online publication date: 1-Oct-2019.
- Al-Saadi R, Armitage G, But J and Branch P (2019). A Survey of Delay-Based and Hybrid TCP Congestion Control Algorithms, IEEE Communications Surveys & Tutorials, 21:4, (3609-3638), Online publication date: 1-Oct-2019.
- Majidi A, Gao X, Zhu S, Jahanbakhsh N and Chen G Adaptive Routing Reconfigurations to Minimize Flow Cost in SDN-Based Data Center Networks Proceedings of the 48th International Conference on Parallel Processing, (1-10)
- Ayala I, Amor M, Fuentes L and Risi M (2019). An Energy Efficiency Study of Web-Based Communication in Android Phones, Scientific Programming, 2019, Online publication date: 1-Jan-2019.
- (2018). SciVis Paper Reviewers, IEEE Transactions on Visualization and Computer Graphics, 25:1, (xxvii-xxvii), Online publication date: 1-Jan-2019.
- (2018). SciVis International Program Committee, IEEE Transactions on Visualization and Computer Graphics, 25:1, (xxii-xxii), Online publication date: 1-Jan-2019.
- (2018). InfoVis Paper Reviewers, IEEE Transactions on Visualization and Computer Graphics, 25:1, (xxv-xxvi), Online publication date: 1-Jan-2019.
- (2018). VAST Paper Reviewers, IEEE Transactions on Visualization and Computer Graphics, 25:1, (xxiv-xxiv), Online publication date: 1-Jan-2019.
- (2018). InfoVis International Program Committee, IEEE Transactions on Visualization and Computer Graphics, 25:1, (xxi-xxi), Online publication date: 1-Jan-2019.
- (2018). VIS Conference Committee, IEEE Transactions on Visualization and Computer Graphics, 25:1, (xix-xix), Online publication date: 1-Jan-2019.
- Kumar P, Tripathi M, Nehra A, Conti M and Lal C (2018). SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN, IEEE Transactions on Network and Service Management, 15:4, (1545-1559), Online publication date: 1-Dec-2018.
- Polese M, Mezzavilla M, Rangan S and Zorzi M Mobility Management for TCP in mmWave Networks Proceedings of the 1st ACM Workshop on Millimeter-Wave Networks and Sensing Systems 2017, (11-16)
- Hanford N, Tierney B and Ghosal D Optimizing data transfer nodes using packet pacing Proceedings of the Second Workshop on Innovating the Network for Data-Intensive Science, (1-8)
- Cohen H and Maoz S Have we seen enough traces? Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, (93-103)
- Smolyar I, Ben-Yehuda M and Tsafrir D Securing self-virtualizing ethernet devices Proceedings of the 24th USENIX Conference on Security Symposium, (335-350)
- Alt L, Beverly R and Dainotti A Uncovering network tarpits with degreaser Proceedings of the 30th Annual Computer Security Applications Conference, (156-165)
- Dart E, Rotman L, Tierney B, Hester M and Zurawski J The Science DMZ Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, (1-10)
- Walkinshaw N, Bogdanov K, Derrick J and Paris J Increasing functional coverage by inductive testing Proceedings of the 22nd IFIP WG 6.1 international conference on Testing software and systems, (126-141)
- Ciuffoletti A (2010). Secure token passing at application level, Future Generation Computer Systems, 26:7, (1026-1031), Online publication date: 1-Jul-2010.
- Walkinshaw N and Derrick J Incrementally discovering testable specifications from program executions Proceedings of the 8th international conference on Formal methods for components and objects, (272-289)
- Zhao H, Chau C and Bellovin S ROFL Proceedings of the 2008 New Security Paradigms Workshop, (23-31)
- Caini C, Firrincieli R, Lacamera D, de Cola T, Marchese M, Marcondes C, Sanadidi M and Gerla M (2009). Analysis of TCP live experiments on a real GEO satellite testbed, Performance Evaluation, 66:6, (287-300), Online publication date: 1-Jun-2009.
- Baars E and Verbrugge R Adjusting a Knowledge-Based Algorithm for Multi-agent Communication for CPS Languages, Methodologies and Development Tools for Multi-Agent Systems, (89-105)
- Billington J and Saboo S An investigation of credit-based flow control protocols Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops, (1-10)
- Billington J and Han B (2007). Formalising TCP's Data Transfer Service Language: A Symbolic Automaton and its Properties, Fundamenta Informaticae, 80:1-3, (49-74), Online publication date: 1-Mar-2008.
- Phanishayee A, Krevat E, Vasudevan V, Andersen D, Ganger G, Gibson G and Seshan S Measurement and analysis of TCP throughput collapse in cluster-based storage systems Proceedings of the 6th USENIX Conference on File and Storage Technologies, (1-14)
- Denis A (2007). Meta-communications in component-based communication frameworks for grids, Cluster Computing, 10:3, (253-263), Online publication date: 1-Sep-2007.
- Alstes A and Lindqvist J (2007). VERKKOKE, ACM SIGCSE Bulletin, 39:3, (91-95), Online publication date: 25-Jun-2007.
- Alstes A and Lindqvist J VERKKOKE Proceedings of the 12th annual SIGCSE conference on Innovation and technology in computer science education, (91-95)
- Minshall G, Hinden B, Hoffman E, Liaw F, Lyon T and Newman P (2006). Flow labelled IP over ATM, ACM SIGCOMM Computer Communication Review, 36:3, (79-92), Online publication date: 5-Jul-2006.
- Luo X and Chang R Novel approaches to end-to-end packet reordering measurement Proceedings of the 5th ACM SIGCOMM conference on Internet measurement, (20-20)
- López L, Almansa G, Paquelet S and Fernández A (2005). A mathematical model for the TCP tragedy of the commons, Theoretical Computer Science, 343:1-2, (4-26), Online publication date: 10-Oct-2005.
- Karthik S, Senthilkumar V, Chidambararajan B and Srivatsa S (2004). Performance of TCP over satellite networks under severe cross-traffic using GA, International Journal of Mobile Communications, 2:4, (382-394), Online publication date: 1-Dec-2004.
- Grinnemo K, Garcia J and Brunstrom A (2004). Taxonomy and survey of retransmission-based partially reliable transport protocols, Computer Communications, 27:15, (1441-1452), Online publication date: 1-Sep-2004.
- Gevros P and Crowcroft J (2004). Distributed resource management with heterogeneous linear controls, Computer Networks: The International Journal of Computer and Telecommunications Networking, 45:6, (835-858), Online publication date: 21-Aug-2004.
- Solis I and Obraczka K (2004). FLIP, Mobile Networks and Applications, 9:4, (347-361), Online publication date: 1-Aug-2004.
- Patel P, Whitaker A, Wetherall D, Lepreau J and Stack T (2003). Upgrading transport protocols using untrusted mobile code, ACM SIGOPS Operating Systems Review, 37:5, (1-14), Online publication date: 1-Dec-2003.
- Patel P, Whitaker A, Wetherall D, Lepreau J and Stack T Upgrading transport protocols using untrusted mobile code Proceedings of the nineteenth ACM symposium on Operating systems principles, (1-14)
- Carter C, Yi S, Ratanchandani P and Kravets R Manycast Proceedings of the 9th annual international conference on Mobile computing and networking, (273-285)
- Mogul J TCP offload is a dumb idea whose time has come Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9, (5-5)
- Dunkels A Full TCP/IP for 8-bit architectures Proceedings of the 1st international conference on Mobile systems, applications and services, (85-98)
- Jha S and Hassan M (2002). Building agents for rule-based intrusion detection system, Computer Communications, 25:15, (1366-1373), Online publication date: 1-Sep-2002.
- Garg R, Kamra A and Khurana V (2002). A game-theoretic approach towards congestion control in communication networks, ACM SIGCOMM Computer Communication Review, 32:3, (47-61), Online publication date: 1-Jul-2002.
- Andersen D, Balakrishnan H, Kaashoek F and Morris R (2001). Resilient overlay networks, ACM SIGOPS Operating Systems Review, 35:5, (131-145), Online publication date: 1-Dec-2001.
- Andersen D, Balakrishnan H, Kaashoek F and Morris R Resilient overlay networks Proceedings of the eighteenth ACM symposium on Operating systems principles, (131-145)
- Kravets R, Carter C and Magalhães L (2001). A cooperative approach to user mobility, ACM SIGCOMM Computer Communication Review, 31:5, (57-69), Online publication date: 1-Oct-2001.
- Andersen D, Bansal D, Curtis D, Seshan S and Balakrishnan H System support for bandwidth management and content adaptation in internet applications Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
- Adjie-Winoto W, Schwartz E, Balakrishnan H and Lilley J (1999). The design and implementation of an intentional naming system, ACM SIGOPS Operating Systems Review, 33:5, (186-201), Online publication date: 12-Dec-1999.
- Adjie-Winoto W, Schwartz E, Balakrishnan H and Lilley J The design and implementation of an intentional naming system Proceedings of the seventeenth ACM symposium on Operating systems principles, (186-201)
- Wolski R (1998). Dynamically forecasting network performance using the Network Weather Service, Cluster Computing, 1:1, (119-132), Online publication date: 1-May-1998.
- Patel A and Gaffney K (1997). A technique for multi-network access to multimedia messages, Computer Communications, 20:5, (324-337), Online publication date: 1-Jul-1997.
- Bellovin S Probable Plaintext Cryptanalysis of the IP Security Protocols Proceedings of the 1997 Symposium on Network and Distributed System Security
- Bellovin S Problem areas for the IP security protocols Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (21-21)
- Comer D and Lin J Probing TCP implementations Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1, (17-17)
Recommendations
Packetized voice transmission using RT-MAC, a wireless real-time medium access control protocol
RT-MAC is a simple, elegant, and robust medium access control (MAC) protocol for use in transmitting real-time data in point-to-point ad hoc wireless local area networks (WLANs). Our enhancement of IEEE 802.11, real-time MAC (RT-MAC), dramatically ...
Transmission Order Deducing MAC (TOD-MAC) protocol for CSMA/CA wireless networks
The increase in physical (PHY) layer transmission rates in IEEE WLAN does not necessarily give the corresponding increase of MAC layer throughput because of MAC overhead such as PHY headers and contention time. To improve MAC layer efficiency, we ...
Effect of Adaptive RTS/CTS ON/OFF Control Method for Mitigating Transmission Overhead of IEEE802.11DCF
BWCCA '10: Proceedings of the 2010 International Conference on Broadband, Wireless Computing, Communication and ApplicationsIEEE802.11, the widely used wireless LAN standard, employs RTS/CTS handshake to avoid a packet collision with the transmissions from hidden terminals. Although RTS/CTS handshake effectively reduces packet collisions with hidden terminals, it also ...