On accelerating content delivery in mobile networks

T Han, N Ansari, M Wu, H Yu - IEEE Communications Surveys & …, 2012 - ieeexplore.ieee.org
Owing to the imminent fixed mobile convergence, Internet applications are frequently
accessed through mobile devices. Given limited bandwidth and unreliable wireless …

Investigating transparent web proxies in cellular networks

X Xu, Y Jiang, T Flach, E Katz-Bassett… - Passive and Active …, 2015 - Springer
People increasingly use mobile devices as their primary means to access the Internet. While
it is well known that cellular network operators employ middleboxes, the details of their …

Monitoring and measuring wireless network performance in the presence of middleboxes

A Botta, A Pescapé - 2011 Eighth International Conference on …, 2011 - ieeexplore.ieee.org
Monitoring and measurement of wireless networks play an important role for a number of
reasons. In current networking scenarios, middleboxes (NAT, firewall, PEP, PCMS,...) are …

Detecting cellular middleboxes using passive measurement techniques

U Goel, M Steiner, MP Wittie, M Flack… - Passive and Active …, 2016 - Springer
Abstract The Transmission Control Protocol (TCP) follows the end-to-end principle–when a
client establishes a connection with a server, the connection is only shared by two physical …

Wavelet-based texture segmentation of remotely sensed images

M Acharyya, MK Kundu - Proceedings 11th International …, 2001 - ieeexplore.ieee.org
A texture feature extraction scheme based on M-band wavelet packet frames is investigated.
The features so extracted are used for segmentation of satellite images which usually have …

Ubiquitous web access: collaborative optimization and dynamic content negotiation

X Sanchez-Loro, V Beltran… - … on Multimedia and …, 2008 - ieeexplore.ieee.org
Traditionally, cellular wide area networks like UMTS are used as Internet access networks
for particular users but, in some cases, they can be employed to provide Internet access to …

[PDF][PDF] Multilayer IPSec (ML-IPSec) Protocol Design for improved security performance over satellites

H Cruickshank, N Bhutta… - 17th Ka and …, 2011 - openresearch.surrey.ac.uk
There are a variety of satellite applications that require application intelligence at
intermediate devices for their proper functioning eg satellite networks using (Performance …

Client-side web proxy detection from unprivileged mobile devices

H Zhang, D Choffnes - arXiv preprint arXiv:1511.04493, 2015 - arxiv.org
Mobile devices that connect to the Internet via cellular networks are rapidly becoming the
primary medium for accessing Web content. Cellular service providers (CSPs) commonly …

A proxy-based system for dynamic content negotiation and collaborative optimization in heterogenic environments

X Sanchez-Loro, V Beltran, J Casademont… - … Automation & Soft …, 2010 - Taylor & Francis
Abstract Ubiquitous and Pervasive Computing relies on ubiquitous network access and
applications' context-awareness. This pervasive access implies exchanging traffic with a …

Internet measurements and application layer optimizations for faster web communications

U Goel - 2017 - search.proquest.com
The evolution of Web technologies enables interactive Web communications and makes the
Web ecosystem more complex. To ensure timely delivery of Web content, the Web …