<--- Back to Details
First PageDocument Content
Network performance / Computing / Network management / Network architecture / Queuing delay / Transmission Control Protocol / Packet loss / Robust random early detection / Traffic flow / Random early detection / Tail drop / Throughput
Date: 2009-05-21 14:03:01
Network performance
Computing
Network management
Network architecture
Queuing delay
Transmission Control Protocol
Packet loss
Robust random early detection
Traffic flow
Random early detection
Tail drop
Throughput

Flow Rate Management and P2P Control

Add to Reading List

Source URL: packet.cc

Download Document from Source Website

File Size: 208,47 KB

Share Document on Facebook

Similar Documents

Network performance / Computing / Network management / Network architecture / Queuing delay / Transmission Control Protocol / Packet loss / Robust random early detection / Traffic flow / Random early detection / Tail drop / Throughput

Flow Rate Management and P2P Control

DocID: 1r9FN - View Document

Network performance / Computing / Network management / Random early detection / Transmission Control Protocol / Robust random early detection / Router / Queueing theory / TCP congestion control / DECbit

Controlo 2002 5th Portuguese Conference on Automatic Control University of Aveiro, Aveiro, September 55- 7, 2002 Switched Systems:

DocID: 1qpRO - View Document

Network performance / Computing / Network architecture / Network management / Transmission Control Protocol / Packet loss / Queuing delay / Robust random early detection / Bandwidth management / Traffic flow / Flow control / Traffic shaping

Flow Rate Management and P2P Control

DocID: 1qfsO - View Document

Network performance / Computing / Network management / Network architecture / TCP congestion control / Transmission Control Protocol / Elephant flow / Bandwidth-delay product / Transport layer / Robust random early detection / Throughput / Additive increase/multiplicative decrease

Adaptive Data Transmission in the Cloud Wenfei Wu ∗ , Yizheng Chen ∗ , Ramakrishnan Durairajan ∗ , Dongchan Kim ∗ , Ashok Anand ∗ ∗

DocID: 1q3S9 - View Document

Computer network security / Security / Cyberwarfare / Finance / Spoofing attack / Spoofing / Spoof / Computer security / Speech synthesis / Biometrics / Robust random early detection / Speech technology

ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge Zhizheng Wu1 Tomi Kinnunen2 Nicholas Evans3 Junichi Yamagishi1

DocID: 1pSMR - View Document