• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 549
Next 10 →

Network-on-Chip Multicasting with Low Latency Path Setup

by unknown authors
"... A low-latency path setup approach with multiple setup packets for parallel set is presented. It reduces the header overhead compared to multiaddress encoding. Further, we propose four variants of deadlock-free multicast routing algorithms using different subpath generation methods, different destina ..."
Abstract - Add to MetaCart
A low-latency path setup approach with multiple setup packets for parallel set is presented. It reduces the header overhead compared to multiaddress encoding. Further, we propose four variants of deadlock-free multicast routing algorithms using different subpath generation methods, different

Scalable Application Layer Multicast

by Suman Banerjee, Bobby Bhattacharjee, Christopher Kommareddy , 2002
"... We describe a new scalable application-layer multicast protocol, specifically designed for low-bandwidth, data streaming applications with large receiver sets. Our scheme is based upon a hierarchical clustering of the application-layer multicast peers and can support a number of different data deliv ..."
Abstract - Cited by 731 (21 self) - Add to MetaCart
sites. In our experiments, averagegroup members established and maintained low-latency paths and incurred a maximum packet loss rate of less than 1 % as members randomly joined and left the multicast group. The average control overhead during our experiments was less than 1 Kbps for groups of size 100.

An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering

by Gang Lu, Bhaskar Krishnamachari, Cauligi S. Raghavendra , 2004
"... In many sensor network applications the major traffic pattern consists of data collected from several source nodes to a sink through a unidirectional tree. In this paper, we propose DMAC, an energy efficient and low latency MAC that is designed and optimized for such data gathering trees in wireless ..."
Abstract - Cited by 240 (7 self) - Add to MetaCart
In many sensor network applications the major traffic pattern consists of data collected from several source nodes to a sink through a unidirectional tree. In this paper, we propose DMAC, an energy efficient and low latency MAC that is designed and optimized for such data gathering trees

LASTor: A low-latency AS-aware Tor client

by Masoud Akhoondi, Curtis Yu, Harsha V. Madhyastha - In SP ’12 , 2012
"... Abstract—The widely used Tor anonymity network is designed to enable low-latency anonymous communication. However, in practice, interactive communication on Tor—which accounts for over 90 % of connections in the Tor network [1]—incurs latencies over 5x greater than on the direct Internet path. In ad ..."
Abstract - Cited by 16 (0 self) - Add to MetaCart
Abstract—The widely used Tor anonymity network is designed to enable low-latency anonymous communication. However, in practice, interactive communication on Tor—which accounts for over 90 % of connections in the Tor network [1]—incurs latencies over 5x greater than on the direct Internet path

Tor: The secondgeneration onion router,”

by Roger Dingledine - in 13th USENIX Security Symposium. Usenix, , 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract - Cited by 1229 (33 self) - Add to MetaCart
Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies

Token flow control

by Amit Kumar, et al.
"... As companies move towards many-core chips, an efficient onchip communication fabric to connect these cores assumes critical importance. To address limitations to wire delay scalability and increasing bandwidth demands, state-of-the-art on-chip networks use a modular packet-switched design with route ..."
Abstract - Cited by 635 (35 self) - Add to MetaCart
/delay. In this work, we propose token flow control (TFC), a flow control mechanism in which nodes in the network send out tokens in their local neighborhood to communicate information about their available resources. These tokens are then used in both routing and flow control: to choose less congested paths

Low-Latency Virtual-Channel Routers for On-Chip Networks

by Robert Mullins, Andrew West, Simon Moore - In International Symposium on Computer Architecture , 2004
"... The on-chip communication requirements of many systems are best served through the deployment of a regular chip-wide network. This paper presents the design of a low-latency on-chip network router for such applications. We remove control overheads (routing and arbitration logic) from the critical pa ..."
Abstract - Cited by 148 (1 self) - Add to MetaCart
The on-chip communication requirements of many systems are best served through the deployment of a regular chip-wide network. This paper presents the design of a low-latency on-chip network router for such applications. We remove control overheads (routing and arbitration logic) from the critical

Metrics for Security and Performance in Low-Latency Anonymity Systems

by Steven J. Murdoch, Robert N. M. Watson
"... Abstract. In this paper we explore the tradeoffs between security and performance in anonymity networks such as Tor. Using probability of path compromise as a measure of security, we explore the behaviour of various path selection algorithms with a Tor path simulator. We demonstrate that assumptions ..."
Abstract - Cited by 38 (2 self) - Add to MetaCart
Abstract. In this paper we explore the tradeoffs between security and performance in anonymity networks such as Tor. Using probability of path compromise as a measure of security, we explore the behaviour of various path selection algorithms with a Tor path simulator. We demonstrate

Implementing ARP-Path Low Latency Bridges in NetFPGA

by unknown authors
"... The demo is focused on the implementation of ARP-Path (a.k.a. FastPath) bridges, a recently proposed concept for low latency bridges. ARP-Path Bridges rely on the race between broadcast ARP Request packets, to discover the minimum latency path to the destination host. Several implementations (in Omn ..."
Abstract - Add to MetaCart
The demo is focused on the implementation of ARP-Path (a.k.a. FastPath) bridges, a recently proposed concept for low latency bridges. ARP-Path Bridges rely on the race between broadcast ARP Request packets, to discover the minimum latency path to the destination host. Several implementations (in

Low-Latency Wireless Video Over 802.11

by Networks Using Path, Allen Miu, Allen Miu, John G. Apostolopoulos, John G. Apostolopoulos, Wai-tian Tan, Wai-tian Tan, Mitchell Trott, Mitchell Trott - in Proc. of IEEE ICME , 2003
"... Wireless local area networks, such as 802.11b, are becoming widespread as they provide simple wireless connectivity and data delivery. This paper examines low-latency (conversational) video communication over 802.11b networks. The challenges to enable low-latency video include overcoming the highly ..."
Abstract - Add to MetaCart
Wireless local area networks, such as 802.11b, are becoming widespread as they provide simple wireless connectivity and data delivery. This paper examines low-latency (conversational) video communication over 802.11b networks. The challenges to enable low-latency video include overcoming the highly
Next 10 →
Results 1 - 10 of 549
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University