Results 11 - 20
of
7,314
A binary feedback scheme for congestion avoidance in computer networks
- ACM TRANSACTIONS ON COMPUTER SYSTEMS
, 1990
"... We propose a scheme for congestion avoidance in networks using a connectionless protocol at the network layer. The scheme uses feedback from the network to the users of the network. The interesting challenge for the scheme is to use a minimal amount of feedback (one bit in each packet) from the netw ..."
Abstract
-
Cited by 352 (23 self)
- Add to MetaCart
the network to adjust the amount of traffic allowed into the network. The servers in the network detect congestion and set a congestion indication bit on packets flowing in the forward direction. The congestion indication is commu-nicated back to the users through the transport level acknowledgement
MSOCKS: An Architecture for Transport Layer Mobility
, 1998
"... Mobile nodes of the future will be equiped with multiple network interfaces to take advantage of overlay networks, yet no current mobility systems provide full support for the simultaneous use of multiple interfaces. The need for such support arises when multiple connectivity options are available w ..."
Abstract
-
Cited by 147 (0 self)
- Add to MetaCart
with different cost, coverage, latency and bandwidth characteristics, and applications want their data to flow over the interface that best matches the characteristics of the data. We present an architecture called Transport Layer Mobility that allows mobile nodes to not only change their point of attachment
An Integrated Congestion Management Architecture for Internet Hosts
- In Proc. ACM SIGCOMM
, 1999
"... This paper presents a novel framework for managing network congestion from an end-to-end perspective. Our work is motivated by several trends in traffic patterns that threaten the long-term stability of the Internet. These trends include the use of multiple independent concurrent flows by Web app ..."
Abstract
-
Cited by 295 (24 self)
- Add to MetaCart
This paper presents a novel framework for managing network congestion from an end-to-end perspective. Our work is motivated by several trends in traffic patterns that threaten the long-term stability of the Internet. These trends include the use of multiple independent concurrent flows by Web
Achieving MAC Layer Fairness in Wireless Packet Networks
, 2000
"... Link-layer fairness models that have been proposed for wireline and packet cellular networks cannot be generalized for shared channel wireless networks because of the unique characteristics of the wireless channel, such as location-dependent contention, inherent conflict between optimizing channel u ..."
Abstract
-
Cited by 242 (2 self)
- Add to MetaCart
utilization and achieving fairness, and the absence of any centralized control. In this paper, we propose a general analytical framework that captures the unique characteristics of shared wireless channels and allows the modeling of a large class of systemwide fairness models via the specification of per-flow
On Three-Layer Architectures
- Artificial Intelligence and Mobile Robots
, 1998
"... firestorm of interest in autonomous robots with the introduction of the Subsumption architecture 1 [Brooks86]. At the time, the dominant view in the AI community was that a control system for an autonomous mobile robot should be decomposed into three functional elements: a sensing system, a planning ..."
Abstract
-
Cited by 207 (1 self)
- Add to MetaCart
firestorm of interest in autonomous robots with the introduction of the Subsumption architecture 1 [Brooks86]. At the time, the dominant view in the AI community was that a control system for an autonomous mobile robot should be decomposed into three functional elements: a sensing system, a
The natural flow regime: a paradigm for river conservations and restoration
- BioScience
, 1997
"... Humans have long been fascinated by the dynamism of free-flowing waters. Yet we have expended great effort to tame rivers for transportation, water supply, flood control, agriculture, and power generation. It is now recognized that harnessing of streams and rivers comes at great cost: Many rivers no ..."
Abstract
-
Cited by 235 (9 self)
- Add to MetaCart
Humans have long been fascinated by the dynamism of free-flowing waters. Yet we have expended great effort to tame rivers for transportation, water supply, flood control, agriculture, and power generation. It is now recognized that harnessing of streams and rivers comes at great cost: Many rivers
Information flow control for standard OS abstractions
- IN SOSP
, 2007
"... Decentralized Information Flow Control (DIFC) [24] is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world. As applied to privacy, DIFC allows untrusted software to compute with private data while trusted securit ..."
Abstract
-
Cited by 189 (11 self)
- Add to MetaCart
Decentralized Information Flow Control (DIFC) [24] is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world. As applied to privacy, DIFC allows untrusted software to compute with private data while trusted
Tutorial Notes on Partial Evaluation
- Proceedings of the Twentieth Annual ACM Symposium on Principles of Programming Languages
, 1993
"... The last years have witnessed a flurry of new results in the area of partial evaluation. These tutorial notes survey the field and present a critical assessment of the state of the art. 1 Introduction Partial evaluation is a source-to-source program transformation technique for specializing program ..."
Abstract
-
Cited by 248 (59 self)
- Add to MetaCart
programs with respect to parts of their input. In essence, partial evaluation removes layers of interpretation. In the most general sense, an interpreter can be defined as a program whose control flow is determined by its input data. As Abelson points out, [43, Foreword], even programs
A Distributed Resource Management Architecture that Supports Advance Reservations and Co-Allocation
"... The realization of end-to-end quality of service (QoS) guarantees in emerging network-based applications requires mechanisms that support first dynamic discovery and then advance or immediate reservation of resources that will often be heterogeneous in type and implementation and independently contr ..."
Abstract
-
Cited by 245 (26 self)
- Add to MetaCart
controlled and administered.We propose the Globus Architecture for Reservation and Allocation (GARA) to address these four issues.GARA treats both reservations and computational elements such as processes, network flows, and memory blocks as first class entities, allowing them to be created, monitored
The electronic properties of graphene
- Rev. Mod. Phys. 2009
"... This article reviews the basic theoretical aspects of graphene, a one-atom-thick allotrope of carbon, with unusual two-dimensional Dirac-like electronic excitations. The Dirac electrons can be controlled by application of external electric and magnetic fields, or by altering sample geometry and/or t ..."
Abstract
-
Cited by 236 (1 self)
- Add to MetaCart
or armchair � and affect the physical properties of nanoribbons. Different types of disorder modify the Dirac equation leading to unusual spectroscopic and transport properties. The effects of electron-electron and electron-phonon interactions in single layer and multilayer graphene are also
Results 11 - 20
of
7,314