Mostrando 4 resultados de: 4
Filtros aplicados
Publisher
2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2014(1)
IEEE Communications Magazine(1)
IFIP Networking 2020 Conference and Workshops, Networking 2020(1)
Proceedings - International Conference on Computer Communications and Networks, ICCCN(1)
Área de conocimiento
Ciencias de la computación(3)
Computación en la nube(1)
Comunicación(1)
Estadísticas(1)
Red informática(1)
Origen
scopus(4)
Improving TCP performance and reducing self-induced congestion with receive window modulation
Conference ObjectAbstract: We present a control module for software edge routers called Receive Window Modulation - RWM. Its maPalabras claves:Edge router, Rate limiting, Self-induced congestion, TCP flow controlAutores:Arcas-Abella O., Ciaccia F., Diego Montero, Milito R., Nemirovsky M., Romero I., Serral-Gracià R.Fuentes:googlescopusKey ingbkp_redients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing
Conference ObjectAbstract: This paper examines some of the most promising and challenging scenarios in IoT, and shows why currePalabras claves:actuation, CLOUD COMPUTING, data analytics, fog computing, IOT, mobility, Real-time control, securityAutores:Diego Montero, Milito R., Nemirovsky M., Serral-Gracià R., Yannuzzi M.Fuentes:googlescopusVirtualized Security at the Network Edge: A User-Centric Approach
ArticleAbstract: The current device-centric protection model against security threats has serious limitations. On onePalabras claves:Autores:Basile C., Bosco F., Charalambides S., Ciaccia F., Diego Montero, Georgiades M., Jacquin L., Kuusijärvi J., Lioy A., Nemirovsky M., Pastor A., Risso F., Sassu R., Serral-Gracià R., Shaw A., Yannuzzi M.Fuentes:googlescopusSABES: Statistical Available Bandwidth EStimation from passive TCP measurements
Conference ObjectAbstract: Estimating available network resources is fundamental when adapting the sending rate both at the appPalabras claves:Available bandwidth, network machine learning, passive probingAutores:Arcas-Abella O., Ciaccia F., Diego Montero, Nemirovsky M., Romero I., Serral-Gracià R.Fuentes:googlescopus