Abstract—The increasing density of WiFi Access Points (APs) in metropolitan areas is enabling an opportunistic model of wireless networking, whereby a “guest ” user within range of one or more wireless APs can gain temporary Internet access through these APs. In this paper, we address the problem of TCP throughput prediction for opportunistic networks. Applications of opportunistic networking can benefit from such predictions by adapting to prevailing network conditions. Our approach is different from prior efforts to model wireless network throughput in that only the two communicating endpoints participate in the prediction, and no information about network topology or traffic loads generated by interfering sources is required. Our goal is...
The Transmission Control Protocol (TCP) has proved to be a reliable transport protocol that has with...
With the advent of overlay and peer-to-peer networks, Grid computing, and CDNs, network performance...
Our goal is to characterize the traffic load in an IEEE802.11 infrastructure. This can be beneficial...
The Transmission Control Protocol (TCP) has been the protocol of choice for many Internet applicatio...
Abstract—TCP throughput prediction is an important capability for networks where multiple paths exis...
Abstract—In this paper, we address an important problem in mobile ad hoc networks, namely, the intri...
International audienceThroughput has a strong impact on user experience in cellular networks. The ab...
In this paper, we wish to derive analytic models that predict the performance of TCP flows between s...
Abstract — Wireless local area networks (WLANs) are emerging as a popular technology for access to t...
Predicting the expected throughput of TCP is important for several aspects such as e.g. determining ...
With the advent of overlay and peer-to-peer networks, Grid computing, and CDNs, network performance ...
This paper develops an analytical framework to model the interaction between TCP and 802.11 MAC prot...
The ever increasing number of mobile devices in Smart Cities and their heavy use, not only for perso...
In this thesis, we propose several inference techniques to discover network properties for wired and...
International audienceIn wireless networks, the physical medium is the cause of most of the errors a...
The Transmission Control Protocol (TCP) has proved to be a reliable transport protocol that has with...
With the advent of overlay and peer-to-peer networks, Grid computing, and CDNs, network performance...
Our goal is to characterize the traffic load in an IEEE802.11 infrastructure. This can be beneficial...
The Transmission Control Protocol (TCP) has been the protocol of choice for many Internet applicatio...
Abstract—TCP throughput prediction is an important capability for networks where multiple paths exis...
Abstract—In this paper, we address an important problem in mobile ad hoc networks, namely, the intri...
International audienceThroughput has a strong impact on user experience in cellular networks. The ab...
In this paper, we wish to derive analytic models that predict the performance of TCP flows between s...
Abstract — Wireless local area networks (WLANs) are emerging as a popular technology for access to t...
Predicting the expected throughput of TCP is important for several aspects such as e.g. determining ...
With the advent of overlay and peer-to-peer networks, Grid computing, and CDNs, network performance ...
This paper develops an analytical framework to model the interaction between TCP and 802.11 MAC prot...
The ever increasing number of mobile devices in Smart Cities and their heavy use, not only for perso...
In this thesis, we propose several inference techniques to discover network properties for wired and...
International audienceIn wireless networks, the physical medium is the cause of most of the errors a...
The Transmission Control Protocol (TCP) has proved to be a reliable transport protocol that has with...
With the advent of overlay and peer-to-peer networks, Grid computing, and CDNs, network performance...
Our goal is to characterize the traffic load in an IEEE802.11 infrastructure. This can be beneficial...