A fair AQM scheme for aggregated ECN and non-ECN traffic
We study the aggregated behaviour of the Transmission Control Protocol (TCP) with and without Explicit Congestion Notification (ECN) over a wide range of traffic conditions using different Active Queue Management (AQM) schemes. A new AQM scheme called Adaptive Rate-Queue Utilisation AQM (ARQUA) whic...
| Main Author: | Chong, P |
|---|---|
| Format: | Article |
| Published: |
2004
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2475/ |
Similar Items
Fairness Categorization Policy Of Queuing Theory For Geographic Information System Job Scheduling
by: Kheoh, Hooi Leng
Published: (2013)
by: Kheoh, Hooi Leng
Published: (2013)
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006)
by: Yap, Wun She, et al.
Published: (2006)
3-Move undeniable signature scheme
by: Kurosawa, Kaoru, et al.
Published: (2005)
by: Kurosawa, Kaoru, et al.
Published: (2005)
Common Radio Resource Management: Joint Call Admission Control And Traffic Offloading Method
by: Zaini, Khuzairi Mohd
Published: (2018)
by: Zaini, Khuzairi Mohd
Published: (2018)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
Generalized Scheme For Fractal Based Digital Signature (GFDS).
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Enhanced Statistical Modelling For Variable Bit Rate Video Traffic Generated From Scalable Video Codec
by: Ahmadpour, Sima
Published: (2016)
by: Ahmadpour, Sima
Published: (2016)
A Real Time Visual Monitoring Module For Traffic Conditions Based On A Modified Auto-Associative Memory
by: Kareem, Emad Issa Abdul
Published: (2012)
by: Kareem, Emad Issa Abdul
Published: (2012)
An optimized framework for header suppression of real time IPV6 traffic in multiprotocol label switching (MPLS) networks.
by: Mohammed, Imad Jasim
Published: (2011)
by: Mohammed, Imad Jasim
Published: (2011)
A prediction-based neural network scheme for lossless data compression
by: Logeswaran, R.
Published: (2002)
by: Logeswaran, R.
Published: (2002)
Fairness and Interactive Performance of O(1) and CFS Linux Kernel Schedulers
by: C. S., Wong, et al.
Published: (2008)
by: C. S., Wong, et al.
Published: (2008)
A New Digital Signature Scheme Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Nearest neighbourhood classifiers in a bimodal biometric verification system fusion decision scheme
by: Teoh,, A, et al.
Published: (2004)
by: Teoh,, A, et al.
Published: (2004)
SLA-driven flexible bandwidth reservation negotiation schemes for QoS aware IP networks
by: Chieng, David, et al.
Published: (2004)
by: Chieng, David, et al.
Published: (2004)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
Minimizing The Garbage Collection Time In Flash Memory Using Efficient Data Allocation Scheme.
by: Rahiman, Amir Rizaan
Published: (2009)
by: Rahiman, Amir Rizaan
Published: (2009)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
Passive operating system fingerprinting based on multi-layered sub-signature matching scheme (MLSMS).
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
Enhanced 3-Tier Storage Management Scheme For Flash Memory-Based Solid State Disk
by: Alsalibi, Ahmed I N
Published: (2017)
by: Alsalibi, Ahmed I N
Published: (2017)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Non-Repudiation In Web Services.
by: Ling, Elvis,Ing Seng, et al.
Published: (2007)
by: Ling, Elvis,Ing Seng, et al.
Published: (2007)
An iterative approach to enhanced traffic signal optimization
by: WONG, Y, et al.
Published: (2008)
by: WONG, Y, et al.
Published: (2008)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
The impact of OBS burst aggregation on VBR performance
by: Al-Shargabi, Mohamad Abdulatef, et al.
Published: (2007)
by: Al-Shargabi, Mohamad Abdulatef, et al.
Published: (2007)
Intelligent Traffic Information System for Klang Valley, Malaysia
by: Patrick Soh, Chin-Hooi, et al.
Published: (2008)
by: Patrick Soh, Chin-Hooi, et al.
Published: (2008)
Improving the performance of traffic sign detection using blob tracking
by: Soetedjo, Aryuanto, et al.
Published: (2007)
by: Soetedjo, Aryuanto, et al.
Published: (2007)
Face recognition using wavelet transform and non-negative matrix factorization
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
Non-greedy minimum interference routing algorithm for bandwidth-guaranteed flows
by: Tan, Su Wei, et al.
Published: (2002)
by: Tan, Su Wei, et al.
Published: (2002)
Uplink traffic scheduling with QoS support in broadband wireless access networks
by: Tang, Sze Yin, et al.
Published: (2009)
by: Tang, Sze Yin, et al.
Published: (2009)
Parametric and non-parametric approaches in evaluating martingale hypothesis of energy spot markets
by: Cheong, Chin Wen
Published: (2011)
by: Cheong, Chin Wen
Published: (2011)
Linkability of some blind signature schemes
by: Heng, Swee-Huay, et al.
Published: (2007)
by: Heng, Swee-Huay, et al.
Published: (2007)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
Multipath Cluster Based Routing Protocol For Non-Uniform Node Density Mobile Ad Hoc Networks
by: Mohammed Mahdi, Mohammed Abdo
Published: (2016)
by: Mohammed Mahdi, Mohammed Abdo
Published: (2016)
Ad Hoc Wireless Routing With Density Based Probabilistic Algorithm For Mobile Wireless Networks With Non-Uniform Node Distribution
by: Ong , Hean Loong
Published: (2010)
by: Ong , Hean Loong
Published: (2010)
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)
by: Yap, Wun-She, et al.
Published: (2007)
Translation and scale invariants of Legendre moments
by: Chong, C
Published: (2004)
by: Chong, C
Published: (2004)
Similar Items
-
Fairness Categorization Policy Of Queuing Theory For Geographic Information System Job Scheduling
by: Kheoh, Hooi Leng
Published: (2013) -
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006) -
3-Move undeniable signature scheme
by: Kurosawa, Kaoru, et al.
Published: (2005) -
Common Radio Resource Management: Joint Call Admission Control And Traffic Offloading Method
by: Zaini, Khuzairi Mohd
Published: (2018) -
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)