<--- Back to Details
First PageDocument Content
Data / Active queue management / Robust random early detection / Network congestion / Transmission Control Protocol / Random early detection / Queuing delay / Additive increase/multiplicative decrease / TCP Vegas / Network performance / Computing / Management
Date: 2003-08-21 10:53:01
Data
Active queue management
Robust random early detection
Network congestion
Transmission Control Protocol
Random early detection
Queuing delay
Additive increase/multiplicative decrease
TCP Vegas
Network performance
Computing
Management

Proceedings Template - WORD

Add to Reading List

Source URL: conferences.sigcomm.org

Download Document from Source Website

File Size: 437,16 KB

Share Document on Facebook

Similar Documents

Network performance / Computing / Network management / Network architecture / Queuing delay / Transmission Control Protocol / Packet loss / Robust random early detection / Traffic flow / Random early detection / Tail drop / Throughput

Flow Rate Management and P2P Control

DocID: 1r9FN - View Document

Network performance / Computing / Network management / Random early detection / Transmission Control Protocol / Robust random early detection / Router / Queueing theory / TCP congestion control / DECbit

Controlo 2002 5th Portuguese Conference on Automatic Control University of Aveiro, Aveiro, September 55- 7, 2002 Switched Systems:

DocID: 1qpRO - View Document

Network performance / Computing / Network architecture / Network management / Transmission Control Protocol / Packet loss / Queuing delay / Robust random early detection / Bandwidth management / Traffic flow / Flow control / Traffic shaping

Flow Rate Management and P2P Control

DocID: 1qfsO - View Document

Network performance / Computing / Network management / Network architecture / TCP congestion control / Transmission Control Protocol / Elephant flow / Bandwidth-delay product / Transport layer / Robust random early detection / Throughput / Additive increase/multiplicative decrease

Adaptive Data Transmission in the Cloud Wenfei Wu ∗ , Yizheng Chen ∗ , Ramakrishnan Durairajan ∗ , Dongchan Kim ∗ , Ashok Anand ∗ ∗

DocID: 1q3S9 - View Document

Computer network security / Security / Cyberwarfare / Finance / Spoofing attack / Spoofing / Spoof / Computer security / Speech synthesis / Biometrics / Robust random early detection / Speech technology

ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge Zhizheng Wu1 Tomi Kinnunen2 Nicholas Evans3 Junichi Yamagishi1

DocID: 1pSMR - View Document