TCP behavior of a busy Internet server: Analysis and improvements

H Balakrishnan, VN Padmanabhan… - … . IEEE INFOCOM'98 …, 1998 - ieeexplore.ieee.org
We analyze the way in which Web browsers use TCP connections based on extensive traffic
traces obtained from a busy Web server (the official Web server of the 1996 Atlanta Olympic …

Media sharing based on colocation prediction in urban transport

L McNamara, C Mascolo, L Capra - Proceedings of the 14th ACM …, 2008 - dl.acm.org
People living in urban areas spend a considerable amount of time on public transport, for
example, commuting to/from work. During these periods, opportunities for inter-personal …

A mobile peer-to-peer system for opportunistic content-centric networking

ÓR Helgason, EA Yavuz, ST Kouyoumdjieva… - Proceedings of the …, 2010 - dl.acm.org
In this work we present a middleware architecture for a mobile peer-to-peer content
distribution system. Our architecture allows wireless content dissemination between mobile …

BRDF acquisition with basis illumination

A Ghosh, S Achutha, W Heidrich… - 2007 IEEE 11th …, 2007 - ieeexplore.ieee.org
Realistic descriptions of surface reflectance have long been a topic of interest in both
computer vision and computer graphics research. In this paper, we describe a novel and fast …

Evaluating bluetooth as a medium for botnet command and control

K Singh, S Sangal, N Jain, P Traynor, W Lee - Detection of Intrusions and …, 2010 - Springer
Malware targeting mobile phones is being studied with increasing interest by the research
community. While such attention has previously focused on viruses and worms, many of …

BlueID: A practical system for Bluetooth device identification

J Huang, W Albazrqaoe, G **ng - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
Despite the widespread use of Bluetooth technology, identity management of Bluetooth
devices remains a significant challenge because the MAC address and name of Bluetooth …

Challenges and opportunities in immersive vehicular sensing: lessons from urban deployments

G Pau, R Tse - Signal Processing: Image Communication, 2012 - Elsevier
Vehicles provide an ideal platforms for a plethora of emerging applications such as
networked gaming, multimedia content delivery and urban sensing. Cars have no power …

On-demand video streaming in mobile opportunistic networks

H Yoon, JW Kim, F Tan, R Hsieh - 2008 Sixth Annual IEEE …, 2008 - ieeexplore.ieee.org
Providing on-demand video streaming services to large numbers of nodes in mobile
wireless networks is a challenging task. We propose MOVi (mobile opportunistic video-on …

Social‐aware delay tolerant networking for mobile‐to‐mobile file sharing

CE Palazzi, A Bujari - International Journal of Communication …, 2012 - Wiley Online Library
SUMMARY Peer‐to‐peer (P2P) overlay networks and mobile ad hoc networks share many
key characteristics such as self‐organization and decentralization; they also face the crucial …

Link prediction approach for opportunistic networks based on recurrent neural network

X Cai, J Shu, M Al-Kali - IEEE Access, 2018 - ieeexplore.ieee.org
The target of link prediction is used to estimate the possibility of future links among nodes
through known network structures and nodes information. According to the time-varying …