Showing papers in "Computer Networks in 2000"
••
TL;DR: If a hop-by-hop inter-domain routing protocol allows unconstrained route selection at a domain, the protocol may be susceptible to route oscillations, and ways to prevent or avoid persistent oscillations in general topologies are evaluated.
303 citations
••
TL;DR: The potential impact of widespread shopbot usage on prices, the price dynamics that may ensue from various mixtures of automated pricing agents, the potential use of machine-learning algorithms to improve profits, and more generally the interplay among learning, optimization, and dynamics in agent-based information economies are studied.
244 citations
••
TL;DR: A high-level description of the GPRS system is given with emphasis on services and architectural aspects, and the first true packet-switched architecture is described.
106 citations
••
TL;DR: An overview of the work is presented, motivated by a case study combining techniques for consistency checking, refinement, and translation between viewpoint specifications, in particular for LOTOS and Z/Object-Z.
74 citations
••
TL;DR: It is shown that this closed-loop rate-based control method to available bit rate (ABR) flow control in asynchronous transfer mode (ATM) networks ensures good system stability, full utilization of network links and some max–min fairness in bandwidth allocation.
63 citations
••
TL;DR: The transfer protocol framework addressed here is devoted to the design of data transfer protocols and is based on L. Lamport's temporal logic of actions (TLA) which particularly supports the modeling of process systems.
59 citations
••
TL;DR: The way non-Poisson traffic behaviour affects performance of routing strategies is investigated and how the results from dynamic routing investigation can help to optimise the network planning process is presented.
57 citations
••
TL;DR: A new methodology is proposed which uses a Learning Automaton (LA) in combination with equivalent bandwidth approximations to reduce the percentage of overestimation in Call Admission Control (CAC).
54 citations
••
TL;DR: It is demonstrated that: (i) connections do interact affecting the power of each other, and (ii) global search meta-heuristics provide better solutions.
48 citations
••
TL;DR: An approach to feature combination and interaction detection via foreground/background models, which allows expressing features as augmentations to the behavior of a base model, and classifies interactions into three categories, based on how they can be detected, and describes implemented tools which can detect interactions from the three categories.
43 citations
••
TL;DR: Based on an analysis of protection goals and their properties, a user interface for multilateral security is sketched based on the insight gained and the results of a usability test are described.
••
TL;DR: Simulation results demonstrate that under the same link speed and network topology, network nodes employing the DiAserv architecture have substantial performance improvement over the current Best EAort (BE) Internet architecture for multimedia streaming applications.
••
TL;DR: A comprehensive approach for IEPCs as complex information spaces will be presented and a concept for organizing information within IE PCs, which goes beyond simple keywords and multimedia, will bePresented.
••
TL;DR: A coherent framework of interoperable testing is developed in which the notions of interoperability, interoperability testing, interoperable test case and interoperabilityTest architecture are interrelated and a systematic interoperability test suite derivation method based on the framework is developed.
••
TL;DR: This evaluation evaluated actual DS mechanisms provided by Cisco routers, which supports flow-specific QoS specification, immediate and advance reservation, and online monitoring and control of both individual resources and heterogeneous resource ensembles.
••
TL;DR: The effect of stream multiplexing on delay and jitter-sensitive traffic is analyzed through an experimental approach and two different scheduling algorithms are considered: Priority Queuing (PQ) and Weighted Fair Queued (WFQ).
••
TL;DR: Results show that routing algorithms based on a Markov decision theoretic framework yield better performance than least-load path routing (LLP) without incurring any significant increase in computational complexity.
••
IBM1
TL;DR: An investigation into the distribution issues surrounding the design and implementation of virtual market places (ViMPs) focuses on the structuring of the information space describing the services and products, and its distribution between the providers and the market place mediator.
••
TL;DR: This chapter discusses traffic models and characterization, methodology and ATM switching, quality of service, and performance modelling studies.
••
TL;DR: Phantom, a simple constant space algorithm for rate-based flow control, converges fast to a fair rate allocation while generating a moderate queue length and can be gradually introduced into installed-based TCP networks.
••
TL;DR: VIDOS is a Java-based server–client video management system that permits one to customize a personal version of any downloadable digital video file over the Internet or local intranet and can improve corporate and personal efficiency by speeding network transfers and cutting disc storage requirements.
••
TL;DR: This paper presents a call admission control (CAC) scheme for traffic with self-similar behaviour based on the notion of effective bandwidth that satisfies the quality of service requirements of the source, expressed in terms of buffer overflow probability, while taking into account the long-range dependence property of the traffic through the Hurst parameter.
••
TL;DR: This paperribes serious attacks against IP control and management protocols with an accent on the ICMP protocol, as well as some of the well-known vulnerabilities of the inter-domain routing protocols.
••
TL;DR: Analysis of an optical packet switch making use of fiber delay-lines to resolve output packet contentions and equipped with a set of tunable wavelength converters shared among the input lines shows that the number of converters needed to maintain the packet loss probability is much lower than that needed by the switches proposed in literature.
••
TL;DR: The suitability of H.323 technology and currently available products to support teleteaching services is investigated, based on experience gained during a related deployment at the University of Athens.
••
TL;DR: This paper shows through simulations that deflection routing is an effective technique for packet-switching wavelength routed optical networks with irregular meshed topologies and multiple path routing (MPR) as the deflection rule mitigates the blocking of packets substantially in cross-connected all-optical networks leading to a significant reduction in hardware volume and cost.
••
TL;DR: In 1998, the Fifth International Workshop on Feature Interactions [1] sponsored the first-ever Feature Interaction Detection Contest as mentioned in this paper, where the goal was to compare different automated tools for detecting feature interactions from the feature requirements.
••
TL;DR: This paper presents an implementation example of the mobile agents used to access and to manage information stored in the distributed database repository (DDR), as specified within the ESPRIT Project “Network Oriented Application Harmonization” (NOAH).
••
TL;DR: This paper proposes an Internet search service (ISS) based on common object request broker architecture (CORBA) that follows the style of common object service specification (COSS) and designs a multi-search engine based on ISS, which is term Octopus.
••
TL;DR: This paper covers access network performance analysis by deploying asynchronous transfer mode (ATM) over ADSL within the Telecom Italia experimental department “EXANET” (experimental ATM network) and finds that ADSL is used as a way to relieve congestion on their circuit-switched voice telephony system.