Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,232,305 papers from all fields of science
Search
Sign In
Create Free Account
Network performance
Known as:
8 second rule
, Comparison of latency and throughput
, Eight-second rule
Expand
Network performance refers to measures of service quality of a network as seen by the customer. There are many different ways to measure the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Bandwidth-delay product
Clock recovery
Clock signal
Computer performance
Expand
Broader (1)
Information theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Reconfigurable optical mobile fronthaul networks for coordinated multipoint transmission and reception in 5G
Jiawei Zhang
,
Yuefeng Ji
,
Songhao Jia
,
Hui Li
,
Xiaosong Yu
,
Xinbo Wang
IEEE\/OSA Journal of Optical Communications and…
2017
Corpus ID: 24080537
The fifth generation of mobile communication is characterized by ultra-dense cellular networks, where massive small cells are…
Expand
Highly Cited
2016
Highly Cited
2016
A hybrid framework combining solar energy harvesting and wireless charging for wireless sensor networks
Cong Wang
,
Ji Li
,
Yuanyuan Yang
,
Fan Ye
IEEE INFOCOM - The 35th Annual IEEE…
2016
Corpus ID: 3420879
Recently, there have been a growing number of applications that power wireless sensor networks (WSNs) by wireless charging…
Expand
Highly Cited
2010
Highly Cited
2010
A novel self-tuning feedback controller for active queue management supporting TCP flows
N. Xiong
,
A. Vasilakos
,
+4 authors
Yi Pan
Information Sciences
2010
Corpus ID: 18473390
Highly Cited
2008
Highly Cited
2008
A quality of service negotiation-based vertical handoff decision scheme in heterogeneous wireless systems
Qingyang Song
,
A. Jamalipour
European Journal of Operational Research
2008
Corpus ID: 2976978
Highly Cited
2006
Highly Cited
2006
Modeling and Analysis of Connectivity in Mobile Ad Hoc Networks with Misbehaving Nodes
Fei Xing
,
Wenye Wang
IEEE International Conference on Communications
2006
Corpus ID: 15520272
Mobile ad hoc networks are vulnerable to malicious attacks and failures due to their unique features, such as node mobility and…
Expand
Highly Cited
2004
Highly Cited
2004
Business models and resource management for shared wireless networks
Johan Hultell
,
K. Johansson
,
Jan Markendahl
IEEE 60th Vehicular Technology Conference, . VTC…
2004
Corpus ID: 87041
In this paper we analyze main use cases for sharing wireless access networks between multiple operators and service providers…
Expand
2003
2003
Formation, routing, and maintenance protocols for the BlueRing scatternet of Bluetooths
Ting-Yu Lin
,
Y. Tseng
,
Keng-Ming Chang
,
Chun-Liang Tu
36th Annual Hawaii International Conference on…
2003
Corpus ID: 7228506
The basic networking unit in Bluetooth is piconet, and a larger-area Bluetooth network can be formed by multiple piconets, called…
Expand
1997
1997
An analytical model for wormhole routing with finite size input buffers
Po-Chi Hu
,
L. Kleinrock
1997
Corpus ID: 12442074
Highly Cited
1996
Highly Cited
1996
ServerNet deadlock avoidance and fractahedral topologies
R. Horst
Proceedings of the International Conference on…
1996
Corpus ID: 17957787
This paper examines the problems of deadlock avoidance in multistage networks, and proposes a new class of scalable topologies…
Expand
1993
1993
GIGAswitch System: A High-performance Packet-switching Platform
R. J. Souza
,
P. Krishnakumar
,
+4 authors
R. Walsh
Digital technical journal of Digital Equipment…
1993
Corpus ID: 14940583
The GIGAswitch system is a high-performance packet-switching platform built on a 36-port 100 Mb/s crossbar switching fabric. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE