ICP: Design and evaluation of an interest control protocol for content-centric networking

G Carofiglio, M Gallo… - 2012 Proceedings IEEE …, 2012 - ieeexplore.ieee.org
Content-centric networking (CCN) brings a paradigm shift in the present Internet
communication model by addressing named-data instead of host locations. With respect to …

[图书][B] Stochastic hybrid systems

JP Hespanha, CG Cassandras, HAP Blom, J Lygeros… - 2018 - taylorfrancis.com
Because they incorporate both time-and event-driven dynamics, stochastic hybrid systems
(SHS) have become ubiquitous in a variety of fields, from mathematical finance to biological …

Dons: Fast and affordable discrete event network simulation with automatic parallelization

K Gao, L Chen, D Li, V Liu, X Wang, R Zhang… - Proceedings of the ACM …, 2023 - dl.acm.org
Discrete Event Simulation (DES) is an essential tool for network practitioners. Unfortunately,
existing DES simulators cannot achieve satisfactory performance at the scale of modern …

Deepqueuenet: Towards scalable and generalized network performance estimation with packet-level visibility

Q Yang, X Peng, L Chen, L Liu, J Zhang, H Xu… - Proceedings of the …, 2022 - dl.acm.org
Network simulators are an essential tool for network operators, and can assist important
tasks such as capacity planning, topology design, and parameter tuning. Popular simulators …

Buffer sizes for large multiplexers: TCP queueing theory and instability analysis

G Raina, D Wischik - Next Generation Internet Networks, 2005, 2005 - ieeexplore.ieee.org
In large multiplexers with many TCP flows, the aggregate traffic flow behaves predictably;
this is a basis for the fluid model of Misra, Gong and Towsley V. Misra et al.,(2000) and for a …

Part II: Control theory for buffer sizing

G Raina, D Towsley, D Wischik - ACM SIGCOMM Computer …, 2005 - dl.acm.org
This article describes how control theory has been used to address the question of how to
size the buffers in core Internet routers. Control theory aims to predict whether the is stable …

Analysis of a reputation system for mobile ad-hoc networks with liars

J Mundinger, JY Le Boudec - Performance evaluation, 2008 - Elsevier
The application of decentralized reputation systems is a promising approach to ensure
cooperation and fairness, as well as to address random failures and malicious attacks in …

Unison: A Parallel-Efficient and User-Transparent Network Simulation Kernel

S Bai, H Zheng, C Tian, X Wang, C Liu, X Jin… - Proceedings of the …, 2024 - dl.acm.org
Discrete-event simulation (DES) is a prevalent tool for evaluating network designs. Although
DES offers full fidelity and generality, its slow performance limits its application. To speed up …

SDN-managed provisioning of named computing services in edge infrastructures

M Amadeo, C Campolo, G Ruggeri… - … on Network and …, 2019 - ieeexplore.ieee.org
Pushed by the challenging demands of fifth generation (5G) use cases and the recent
advancements in virtualization technologies, edge network devices are rapidly evolving from …

[HTML][HTML] Application of Bernoulli matrix method for solving two-dimensional hyperbolic telegraph equations with Dirichlet boundary conditions

S Singh, VK Patel, VK Singh, E Tohidi - Computers & Mathematics with …, 2018 - Elsevier
The present article is devoted to develop a new approach and methodology to find the
approximate solution of second order two-dimensional telegraph equations with the Dirichlet …