Author:
Wang Jingyuan,Wen Jiangtao,Zhang Jun,Xiong Zhang,Han Yuxing
Funder
National Natural Science Foundation of China
State Key Program of National Natural Science of China
Basic Science Research Program of Shenzhen
Open Research Fund Program of State Key Laboratory of Software Development Environment
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference47 articles.
1. A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks;Ahmed;Front. Comput. Sci.,2015
2. Data center TCP (DCTCP);Alizadeh;ACM SIGCOMM Comput. Commun. Rev.,2011
3. TCP Vegas: new techniques for congestion detection and avoidance;Bowker;ACM SIGCOMM Comput. Commun. Rev.,1994
4. Cai, H., Ha, S., Rhee, I., Xu, L., et al., 2007. Stochastic ordering for internet congestion control and its applications. In: Proceedings of IEEE INFOCOM 2007, IEEE, Anchorage, Alaska, USA, pp. 910–918.
5. TCP Hybla;Caini;Int. J. Satell. Commun. Netw.,2004
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献