scispace - formally typeset
Search or ask a question

Showing papers in "Computer Networks in 2002"


Journal ArticleDOI
TL;DR: The concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics is described.

17,936 citations


Journal ArticleDOI
TL;DR: The paper presents the overall design of Annotea and describes some of the issues the project has faced and how it has solved them, including combining RDF with XPointer, XLink, and HTTP.

565 citations


Journal ArticleDOI
TL;DR: It is revealed that the applicability of traffic prediction is limited by the deteriorating prediction accuracy with increasing prediction interval, and quantized reference to the optimal online traffic predictability for network control purposes is provided.

252 citations


Journal ArticleDOI
TL;DR: This paper presents call admission control and bandwidth reservation schemes in wireless cellular networks that have been developed based on assumptions more realistic than existing proposals, and adaptively control the admission threshold to achieve a better balance between guaranteeing handoff dropping probability and maximizing resource utilization.

209 citations


Journal ArticleDOI
TL;DR: The definition of keys for XML documents is discussed, paying particular attention to the concept of a relative key , which is commonly used in hierarchically structured documents and scientific databases.

209 citations


Journal ArticleDOI
TL;DR: The in-depth cause of several serious problems encountered in transmission control protocol (TCP) connections in an IEEE 802.11 based multi-hop network are revealed and it is concluded that the current version of this wireless LAN protocol does not function well inMulti-hop ad hoc networks.

178 citations


Journal ArticleDOI
TL;DR: Future evolution of the Web is discussed, and some important issues for search engines will be scheduling and query execution as well as increasingly heterogeneous architectures to handle the dynamic Web.

135 citations


Journal ArticleDOI
TL;DR: The proposed two level model for TCP connection arrivals in local area networks, which has a small number of parameters which are inferred from real traffic collected at a firewall, shows that traffic synthesized with the model closely matches the original data.

134 citations


Journal ArticleDOI
TL;DR: Redland is a flexible and efficient RDF system that complements this power and provides high-level interfaces allowing instances of the model to be stored, queried and manipulated in C, Perl, Python, Tcl, Java and other languages.

132 citations


Journal ArticleDOI
TL;DR: This paper introduces and analyzes an architecture called Transport Layer Mobility that allows mobile nodes to not only change their point of attachment to the Internet within a corporate domain, but also to control which network interfaces are used for the different kinds of data leaving from and arriving at the mobile node.

127 citations


Journal ArticleDOI
Jussi Myllymaki1
TL;DR: Key aspects of ANDES are that it uses XML technologies for data extraction, including Extensible HTML and Extensible Stylesheet Language Transformations, and provides access to the “deep Web”.

Journal ArticleDOI
TL;DR: By analysis and simulations, this paper shows how TCP performance varies as a function of the amount of FEC, and studies in detail this bandwidth tradeoff between TCP and FEC.

Journal ArticleDOI
TL;DR: A distributed optimal location algorithm that requires small nodal memory capacity and computational power is developed that simplifies the combination operation used in the design of a dynamic program.

Journal ArticleDOI
TL;DR: The design and use of a synthetic web proxy workload generator called ProWGen is described to investigate the sensitivity of web proxy cache replacement policies to five selected web workload characteristics, finding three replacement policies are relatively insensitive to the percentage of one-timers in the workload.

Journal ArticleDOI
TL;DR: It is shown how RDFS can be extended to include a more expressive knowledge representation language, Ontology Inference Layer (OIL), which would enrich it with the required additional expressivity and the semantics of that language.

Journal ArticleDOI
TL;DR: This work presents MTCP, a congestion control scheme for large-scale reliable multicast that incorporates several novel features, and proposes new techniques that can effectively handle instances of congestion occurring simultaneously at various parts of a multicast tree.

Journal ArticleDOI
TL;DR: In this article, the authors identify and analyze separately the two mechanisms within TCP that are responsible for this scaling behavior: timeouts and congestion avoidance, and provide analytical models for both mechanisms that, under the proper loss probabilities, accurately predict the range in time-scales and the strength of the sustained correlation structure of the traffic sending rate of a single TCP source.

Journal ArticleDOI
TL;DR: This paper considers source-initiated multicast session traffic in an ad hoc wireless network, operating under hard constraints on the available transmission energy as well as on bandwidth and transceiver resources, and demonstrates how the incorporation of residual energy into the cost metric used for tree construction can provide improved performance.

Journal ArticleDOI
TL;DR: This paper develops a rather general and easy-to-use methodology how to obtain good approximations for queue length distributions in priority and generalized processor sharing systems where the cumulative input traffic streams are modeled as general Gaussian processes with stationary increments.

Journal ArticleDOI
TL;DR: Approaches from statistical physics are applied to investigate the structure of network models whose growth rules mimic aspects of the evolution of the World Wide Web and obtain distinct power-law forms for the in-degree and out-degree distributions with exponents that are in good agreement with current data for the web.

Journal ArticleDOI
TL;DR: The techniques and practices of traffic engineering in contemporary IP networks are discussed, emphasizing the role of MPLS in performance optimization of the public Internet, and the impact of generalized MPLS (GMPLS) on traffic Engineering in IP-over-optical networks as the underlying technologies continue to mature.

Journal ArticleDOI
TL;DR: Simple techniques that address factors contributing to user-perceived latency, including DNS lookup times, transmission control protocol connection–establishment, and start-of-session delays at hypertext transfer protocol (HTTP) servers are proposed, which have a potential to significantly reduce long waits.

Journal ArticleDOI
TL;DR: It is concluded that priority queuing is the most appropriate scheduling scheme for the handling of voice traffic, while preemption of nonvoice packets is strongly recommended for sub-10 Mbit/s links.

Journal ArticleDOI
TL;DR: It is shown that while for a specific network configuration, the derived delay bound is not restricted by the utilization level on the GR, it is so for a general network configuration.

Journal ArticleDOI
TL;DR: The main findings are the probability density function of thefLm process, several scaling results related to a single-server infinite buffer queue fed by fLm traffic, and an asymptotic lower bound for the probability of overflow.

Journal ArticleDOI
TL;DR: TC-Real controls congestion as standard TCP does but allows for a measurement-based transmission strategy, which complements the "blind" increase/ decrease window adjustments, and displays an inherent property to produce comprehensive dynamics in heterogeneous environments with wired or wireless networks and delay-sensitive or -tolerant applications.

Journal ArticleDOI
TL;DR: These policies for caches to proactively validate selected objects as they become stale, and thus allow for more client requests to be processed locally, are proposed and evaluated and compared using trace-based simulations.

Journal ArticleDOI
TL;DR: WHIM is developed, a scalable system that allows multicast content to be marked with distinct information for distinct receivers securely and introduces two new concepts: generating a watermark based on the receiver's location in a tree overlaying the network and inserting the watermark in the content incrementally as it traverses an overlay network.

Journal ArticleDOI
TL;DR: In this article, the authors extend the evolutionary model of the Web graph by including a non-preferential component, and view the stochastic process in terms of an urn transfer model.

Journal ArticleDOI
TL;DR: An integrated admission control scheme to both streaming flows and elastic flows is proposed and detailed packet level simulations of TCP and UDP connections show that the proposed algorithms work satisfactory in the range of admission thresholds predicted by the fluid model.