Showing 241 - 248 results of 248 for search '"Transmission Control Protocol"', query time: 0.15s Refine Results
  1. 241

    Secure and Lightweight Subflow Establishment of Multipath-TCP by Gunhee Noh, Hoorin Park, Heejun Roh, Wonjun Lee

    Published 2019-01-01
    “…Multipath Transmission Control Protocol (MPTCP) is an approach towards high-throughput and efficient load balancing over multiple paths. …”
    Get full text
    Article
  2. 242

    Automated Data Acquisition System Using a Neural Network for Prediction Response in a Mode-Locked Fiber Laser by Jose Ramon Martinez-Angulo, Eduardo Perez-Careta, Juan Carlos Hernandez-Garcia, Sandra Marquez-Figueroa, Jose Hugo Barron Zambrano, Daniel Jauregui-Vazquez, Jose David Filoteo-Razo, Jesus Pablo Lauterio-Cruz, Olivier Pottiez, Julian Moises Estudillo-Ayala, Roberto Rojas-Laguna

    Published 2020-07-01
    “…The system is made up of an optical spectrum analyzer (OSA), oscilloscope (OSC), polarimeter (PAX), and the data acquisition automation through transmission control protocol/internet protocol (TCP/IP). A graphic user interface (GUI) was developed for automated data acquisition with the purpose to study the operational characteristics and stability at the passively mode-locked fiber laser (figure-eight laser, F8L) output. …”
    Get full text
    Article
  3. 243

    Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic by Amina Šljivo, Dwight Kerkhove, Le Tian, Jeroen Famaey, Adrian Munteanu, Ingrid Moerman, Jeroen Hoebeke, Eli De Poorter

    Published 2018-01-01
    “…Although these characteristics are fine for many Internet of Things (IoT) applications, more demanding application requirements could not be met and legacy Internet technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP) could not be used. …”
    Get full text
    Article
  4. 244

    Adaptive Partially Reliable Delivery of Immersive Media Over QUIC-HTTP/3 by Hemanth Kumar Ravuri, Maria Torres Vega, Jeroen Der Van Hooft, Tim Wauters, Filip De Turck

    Published 2023-01-01
    “…However, HTTP is built on top of protocols such as the transmission control protocol (TCP), which prioritize reliability over latency, thereby, inducing additional delay due to acknowledgments and retransmissions, especially on lossy networks. …”
    Get full text
    Article
  5. 245

    Software Development for Speed Trap Radar Control Unit by Abd Rahman, Zulkifli

    Published 2004
    “…A version of application software is also built by using Visual Basic programming software to work together with the developed radar control unit, radar device and camera to enable the laptop PC linking with centre equipment, local and centre database for receiving and sending information processes over a transmission control protocol (TCP/IP) network or Internet. Several specific components of object model (COM/ActiveX) software to fulfil that purpose were used. …”
    Get full text
    Thesis
  6. 246

    Network Coding Meets TCP: Theory and Implementation by Sundararajan, Jay Kumar, Shah, Devavrat, Medard, Muriel, Jakubczak, Szymon Kazimierz, Mitzenmacher, Michael, Barros, Joao

    Published 2012
    “…To realize these benefits in practice, we need to understand how coding across packets interacts with the acknowledgment (ACK)-based flow control mechanism that forms a central part of today's Internet protocols such as transmission control protocol (TCP). Current approaches such as rateless codes and batch-based coding are not compatible with TCP's retransmission and sliding-window mechanisms. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 247

    Adaptive linux-based TCP congestion control algorithm for high-speed networks by Alrshah, Mohamed A.

    Published 2017
    “…Indeed, the overall performance of such networks is significantly influenced by the Transmission Control Protocol (TCP). Although TCP is the predominant transmission protocol used in Internet, its Congestion Control Algorithm (CCA) is still unable to adapt to high-speed networks, which are not the typical environment for which most CCAs were designed. …”
    Get full text
    Thesis
  8. 248

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols and ports other than the following two labeled packets: Transmission Control Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53 (53/UDP). …”
    Get full text
    Thesis