Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,869,405 papers from all fields of science
Search
Sign In
Create Free Account
Network performance
Known as:
8 second rule
, Comparison of latency and throughput
, Eight-second rule
Expand
Network performance refers to measures of service quality of a network as seen by the customer. There are many different ways to measure the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Bandwidth-delay product
Clock recovery
Clock signal
Computer performance
Expand
Broader (1)
Information theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
S. Parvin
,
Song Han
,
B. Tian
,
F. Hussain
IEEE/IFIP International Conference on Embedded…
2010
Corpus ID: 16032034
Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited…
Expand
2008
2008
A load-aware routing metric for wireless mesh networks
L. Nguyen
,
R. Beuran
,
Y. Shinoda
IEEE Symposium on Computers and Communications
2008
Corpus ID: 20805198
Routing metrics play a critical role in wireless mesh networks (WMNs). Several metrics have already been proposed but none of…
Expand
2006
2006
Eavesdropping Minimization via Transmission Power Control in Ad-Hoc Wireless Networks
Jung-Chun Kao
,
R. Marculescu
3rd Annual IEEE Communications Society on Sensor…
2006
Corpus ID: 12098676
Reconnaissance activity is the most frequent incident on computer networks since 2002. In fact, most attacks (including DoS…
Expand
Highly Cited
2006
Highly Cited
2006
Modeling and Analysis of Connectivity in Mobile Ad Hoc Networks with Misbehaving Nodes
Fei Xing
,
Wenye Wang
IEEE International Conference on Communications
2006
Corpus ID: 15520272
Mobile ad hoc networks are vulnerable to malicious attacks and failures due to their unique features, such as node mobility and…
Expand
2005
2005
Maintaining weakly-connected dominating sets for clustering ad hoc networks
Y. Chen
,
Arthur L. Liestman
Ad hoc networks
2005
Corpus ID: 7515260
Highly Cited
2004
Highly Cited
2004
Business models and resource management for shared wireless networks
Johan Hultell
,
K. Johansson
,
Jan Markendahl
IEEE 60th Vehicular Technology Conference, . VTC…
2004
Corpus ID: 87041
In this paper we analyze main use cases for sharing wireless access networks between multiple operators and service providers…
Expand
Highly Cited
2000
Highly Cited
2000
Improving the Up ∗ /Down ∗ Routing Scheme for Networks of Workstations (cid:1)
J. Sancho
,
A. Robles
2000
Corpus ID: 27872345
. Networks of workstations (NOWs) are being considered as a cost-effective alternative to parallel computers. Many NOWs are…
Expand
1997
1997
An analytical model for wormhole routing with finite size input buffers
Po-Chi Hu
,
L. Kleinrock
1997
Corpus ID: 12442074
Highly Cited
1996
Highly Cited
1996
ServerNet deadlock avoidance and fractahedral topologies
R. Horst
Proceedings of the International Conference on…
1996
Corpus ID: 17957787
This paper examines the problems of deadlock avoidance in multistage networks, and proposes a new class of scalable topologies…
Expand
1993
1993
GIGAswitch System: A High-performance Packet-switching Platform
R. J. Souza
,
P. Krishnakumar
,
+4 authors
R. Walsh
Digital technical journal of Digital Equipment…
1993
Corpus ID: 14940583
The GIGAswitch system is a high-performance packet-switching platform built on a 36-port 100 Mb/s crossbar switching fabric. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required