-
1
-
-
33750082462
-
TCP-LP: Lowpriority service via end-point congestion control
-
August
-
A. Kuzmanovic and E. Knightly, "TCP-LP: lowpriority service via end-point congestion control," IEEE/ACM Transactions on Networking, vol. 14, no. 4, pp. 739-752, August 2006.
-
(2006)
IEEE/ACM Transactions on Networking
, vol.14
, Issue.4
, pp. 739-752
-
-
Kuzmanovic, A.1
Knightly, E.2
-
2
-
-
84978371938
-
TCP Nice: A mechanism for background transfers
-
A. Venkataramani, R. Kokku, and M. Dahlin, "TCP Nice: A mechanism for background transfers," in 5th Symposium on Operating Systems Design and Implementation (USENIX OSDI). USENIX, 2002, pp. 329-343.
-
5th Symposium on Operating Systems Design and Implementation (USENIX OSDI). USENIX, 2002
, pp. 329-343
-
-
Venkataramani, A.1
Kokku, R.2
Dahlin, M.3
-
3
-
-
84872318510
-
Announcements:?Torrent 1.9 alpha 15380
-
Available
-
G. Hazel, "Announcements: ?Torrent 1.9 alpha 15380," uTorrent Forum, Nov 2008. [Online]. Available: http://forum.utorrent.com/viewtopic.php? pid=377209
-
UTorrent Forum, Nov 2008. [Online]
-
-
Hazel, G.1
-
8
-
-
78349280620
-
-
BitTorrent, Inc., Tech. Rep., Online. Available
-
A. Norberg, "BEP 0029: uTorrent transport protocol," BitTorrent, Inc., Tech. Rep., 2010. [Online]. Available: http://bittorrent.org/ beps/bep\-0029.html
-
(2010)
BEP 0029: UTorrent Transport Protocol
-
-
Norberg, A.1
-
9
-
-
85013623251
-
Congestion Avoidance and Control
-
August
-
V. Jacobson, "Congestion Avoidance and Control," ACM SIGCOMM Computer Communication Review, vol. 18, no. 4, pp. 314-329, August 1988.
-
(1988)
ACM SIGCOMM Computer Communication Review
, vol.18
, Issue.4
, pp. 314-329
-
-
Jacobson, V.1
-
10
-
-
84872287680
-
POSTER: Destabilizing BitTorrent's Clusters to Attack High Bandwidth Leechers
-
Online. Available
-
F. Adamsky, H. Khan, M. Rajarajan, and S. A. Khayam, "POSTER: Destabilizing BitTorrent's Clusters to Attack High Bandwidth Leechers," in ACM Computer and Communications Security 2011, 2011. [Online]. Available: http://florian.adamsky.it/research/publications/2011/ccsp152a-adamsky.pdf
-
(2011)
ACM Computer and Communications Security 2011
-
-
Adamsky, F.1
Khan, H.2
Rajarajan, M.3
Khayam, S.A.4
-
11
-
-
36348996587
-
Clustering and sharing incentives in BitTorrent systems
-
ACM
-
A. Legout, N. Liogkas, E. Kohler, and L. Zhang, "Clustering and sharing incentives in BitTorrent systems," in Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. ACM, 2007, pp. 301-312.
-
(2007)
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems
, pp. 301-312
-
-
Legout, A.1
Liogkas, N.2
Kohler, E.3
Zhang, L.4
-
12
-
-
84872297922
-
-
TorrentFreak, September Online. Available
-
E. Van Der Sar, "uTorrent Keeps BitTorrent Lead, BitComet Fades Away," TorrentFreak, September 2011. [Online]. Available: http://torrentfreak.com/utorrent-keeps-bittorrent-lead-bitcomet\-fades-away\ -110916/
-
(2011)
uTorrent Keeps BitTorrent Lead, BitComet Fades Away
-
-
Van Der Sar, E.1
-
13
-
-
34548073749
-
Network emulation with NetEm
-
Citeseer, Online. Available
-
S. Hemminger, "Network emulation with NetEm," in Linux Conf Au. Citeseer, 2005. [Online]. Available: http://citeseerx.ist.psu.edu/viewdoc/ download?doi=10.1.1.67.1687&rep=rep1&type=pdf
-
(2005)
Linux Conf Au
-
-
Hemminger, S.1
-
14
-
-
33745803440
-
Misbehaving TCP receivers can cause Internetwide congestion collapse
-
ACM, Online. Available
-
R. Sherwood, B. Bhattacharjee, and R. Braud, "Misbehaving TCP receivers can cause Internetwide congestion collapse," in Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM, 2005, pp. 383-392. [Online]. Available: http://portal.acm.org/citation.cfm?id=1102120. 1102170
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 383-392
-
-
Sherwood, R.1
Bhattacharjee, B.2
Braud, R.3
-
15
-
-
0002098559
-
TCP congestion control with a misbehaving receiver
-
October
-
S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, "TCP congestion control with a misbehaving receiver," ACM SIGCOMM Computer Communication Review, vol. 29, no. 5, pp. 71-78, October 1999.
-
(1999)
ACM SIGCOMM Computer Communication Review
, vol.29
, Issue.5
, pp. 71-78
-
-
Savage, S.1
Cardwell, N.2
Wetherall, D.3
Anderson, T.4
-
16
-
-
84872344533
-
-
Linux-Net Archive, Jan Online. Available
-
S. Hemminger, "Re: fixing opt-ack DoS against TCP-Stack," Linux-Net Archive, Jan 2007. [Online]. Available: http://lkml.indiana.edu/ hypermail/linux/net/0701.1/0003.html/
-
(2007)
Re: Fixing Opt-ack DoS Against TCP-Stack
-
-
Hemminger, S.1
-
17
-
-
77958489033
-
LEDBAT: The new BitTorrent congestion control protocol
-
IEEE, Online. Available
-
D. Rossi, C. Testa, S. Valenti, and L. Muscariello, "LEDBAT: the new BitTorrent congestion control protocol," in Computer Communications and Networks (ICCCN). IEEE, 2010, pp. 1-6. [Online]. Available: http://ieeexplore. ieee.org/xpls/abs\-all.jsp?arnumber=5560080
-
(2010)
Computer Communications and Networks (ICCCN)
, pp. 1-6
-
-
Rossi, D.1
Testa, C.2
Valenti, S.3
Muscariello, L.4
-
18
-
-
85025631246
-
Yes, we LEDBAT: Playing with the new BitTorrent congestion control algorithm
-
Springer, Online. Available
-
D. Rossi, C. Testa, and S. Valenti, "Yes, we LEDBAT: Playing with the new BitTorrent congestion control algorithm," in Passive and Active Measurement. Springer, 2010, pp. 31-40. [Online]. Available: http://www.springerlink.com/index/M4V0200776L3P52H.pdf
-
(2010)
Passive and Active Measurement
, pp. 31-40
-
-
Rossi, D.1
Testa, C.2
Valenti, S.3
-
19
-
-
79957726557
-
Impact of delay variability on LEDBAT performance
-
IEEE, Online. Available
-
A. J. Abu and S. Gordon, "Impact of delay variability on LEDBAT performance," in Advanced Information Networking and Applications. IEEE, 2011, pp. 708-715. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/ epic03/wrapper.htm?arnumber=5763498
-
(2011)
Advanced Information Networking and Applications
, pp. 708-715
-
-
Abu, A.J.1
Gordon, S.2
|