Analysis of a simple feedback scheme for error correction over a lossy network

O Flardh, C Fischione, KH Johansson… - 2007 IEEE …, 2007 - ieeexplore.ieee.org
… The main purpose ofthe protocol boostersMarcus, A. McAuley, and T. Realeigh, "An fec
booster protocol over terrestrial and satellite wireless networks," in International B. Experiments …

{TESLA}: A Transparent, Extensible {Session-Layer} Architecture for End-to-end Network Services

J Salz, H Balakrishnan, A Snoeren - 4th USENIX Symposium on Internet …, 2003 - usenix.org
… Similarly, Protocol Boosters [13] proposes interposing transparent agents between communi…
While Protocol Boosters were originally implemented in the FreeBSD and Linux kernel, they …

[DOC][DOC] Identification of barriers and providing solutions to implement project control system in building projects

A Heravi, M Sarabi - … of the 1st National Conference on …, 2017 - research.usq.edu.au
اجرای به موقع و با کیفیت پروژه های عمرانی از عوامل موثر در تسریع رشد اقتصادی–اجتماعی کشورهای
درحال توسعه بشمار می رود. علیرغم اینکه این سیستم در پروژه های عمرانی در حال بررسی و اجرا …

Modeling cpu demand in heterogeneous active networks

V Galtier, K Mills, Y Carlinet - Proceedings DARPA Active …, 2002 - ieeexplore.ieee.org
Active-network technology envisions deploying execution environments in network elements
so that application-specific processing can be applied to network traffic. To provide safety …

Can Future Internet be based on constrained networks design principles?

…, JL Ferrer, C Gomez, J Casademont, J Paradells - Computer Networks, 2011 - Elsevier
In this paper, we explore the possibility that contributions in the fields of constrained networks
(eg wireless sensor networks) could serve as the basis for building the architecture of the …

[PDF][PDF] IST-2001-37385 6HOP D2. 2

…, R Agüero, L Sánchez, R Sanz, L Muñoz, J Choque… - academia.edu
… This part is ruled by the Protocol Boosters’ Framework, which provides the necessary
management support for the overall packet processing functionality, the traffic classification, the …

Lightweight thread tunnelling in network applications

A Donnelly - Computer Networks, 2006 - Elsevier
… I would like to thank Jonathan Smith at the University of Pennsylvania, whose encouragement
helped make this paper happen. I would also like to thank Tim Harris, Keir Fraser, and the …

Modelling, analysis and experimentation of a simple feedback scheme for error correction control

O Flärdh - 2007 - diva-portal.org
… To capture this tradeoff we introduce a cost function J : R2 ↦→ R that takes the redundancy
u and the distortion d as argument. For small ut, the distortion dt is likely to be high and …

A unified data-centric approach towards an extensible Internet architecture

Y Mao - 2008 - search.proquest.com
… from S to Z, and Z can reach D, then S can reach D.” By modifying this simple example, we
… is the set of all reachable (QS ,D) tuples, representing reachable pairs of nodes from S to D. …