Measuring network throughput

Results: 178



#Item
1#gigablocktestnet  Measuring maximum sustained transaction throughput on a global network of Bitcoin nodes 4 November 2017

#gigablocktestnet Measuring maximum sustained transaction throughput on a global network of Bitcoin nodes 4 November 2017

Add to Reading List

Source URL: scalingbitcoin.org

Language: English - Date: 2017-11-07 06:43:07
    21  Optimal Throughput-Delay Scaling in Wireless Networks – Part I: The Fluid Model Abbas El Gamal, James Mammen, Balaji Prabhakar, and Devavrat Shah

    1 Optimal Throughput-Delay Scaling in Wireless Networks – Part I: The Fluid Model Abbas El Gamal, James Mammen, Balaji Prabhakar, and Devavrat Shah

    Add to Reading List

    Source URL: www-isl.stanford.edu

    Language: English - Date: 2010-04-08 15:08:26
    3C:/Users/beck/Desktop/CSET CONFERENCE 2010/USENIX template/4_11_DRAFT2/jayaram_drmiller changes/FINAL_SUBMISSION_AFTER REVIEW/CSET_submission.dvi

    C:/Users/beck/Desktop/CSET CONFERENCE 2010/USENIX template/4_11_DRAFT2/jayaram_drmiller changes/FINAL_SUBMISSION_AFTER REVIEW/CSET_submission.dvi

    Add to Reading List

    Source URL: static.usenix.org

    Language: English - Date: 2011-07-08 13:42:23
    4Locality Prediction for Oblivious Clients Kevin P. Shanahan, Michael J. Freedman New York University www.coralcdn.org Abstract

    Locality Prediction for Oblivious Clients Kevin P. Shanahan, Michael J. Freedman New York University www.coralcdn.org Abstract

    Add to Reading List

    Source URL: www.cs.princeton.edu

    Language: English - Date: 2007-08-08 12:40:34
    5Sample Network Analysis Report  Report Information Analyst Information Name

    Sample Network Analysis Report Report Information Analyst Information Name

    Add to Reading List

    Source URL: www.wiresharkbook.com

    Language: English - Date: 2014-01-10 03:51:38
    62015 IEEE Symposium on Security and Privacy  Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, †

    2015 IEEE Symposium on Security and Privacy Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, †

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:43:08
    7End-to-End Detection of Compression of Traffic Flows by Intermediaries Vahab Pournaghshband Alexander Afanasyev

    End-to-End Detection of Compression of Traffic Flows by Intermediaries Vahab Pournaghshband Alexander Afanasyev

    Add to Reading List

    Source URL: lasr.cs.ucla.edu

    Language: English - Date: 2014-11-28 06:26:19
    8Aggregation of Network Protocol Data Near its Source Marcel Fourn´e, Kevin Stegemann, Dominique Petersen, and Norbert Pohlmann Institute for Internet Security, Westf¨ alische Hochschule, University of Applied Sciences,

    Aggregation of Network Protocol Data Near its Source Marcel Fourn´e, Kevin Stegemann, Dominique Petersen, and Norbert Pohlmann Institute for Internet Security, Westf¨ alische Hochschule, University of Applied Sciences,

    Add to Reading List

    Source URL: norbert-pohlmann.com

    Language: English - Date: 2015-10-20 12:55:58
    9A First Analysis of Multipath TCP on Smartphones Quentin De Coninck1 , Matthieu Baerts2 , Benjamin Hesmans1 , and Olivier Bonaventure1 1

    A First Analysis of Multipath TCP on Smartphones Quentin De Coninck1 , Matthieu Baerts2 , Benjamin Hesmans1 , and Olivier Bonaventure1 1

    Add to Reading List

    Source URL: inl.info.ucl.ac.be

    Language: English - Date: 2016-06-16 11:23:58
    104948_ibm_4948_kernel_1518_3562_cdf.eps

    4948_ibm_4948_kernel_1518_3562_cdf.eps

    Add to Reading List

    Source URL: fireless.cs.cornell.edu

    Language: English - Date: 2013-02-22 13:55:01