Surgical Time Out

Known as: Time Outs, Surgical, Surgical Timeout, Surgical Time Outs 
 
National Institutes of Health

Topic mentions per year

Topic mentions per year

2000-2014
012320002014

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
In this paper, we present an adaptive retransmission timeout (RTO) algorithm. It can improve the performance of Jacobson's… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
Is this relevant?
2010
2010
When a TCP sender receives three successive duplicate ACKs indicating a packet loss, loss differentiation algorithms (LDAs… (More)
  • figure I
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2010
2010
When TCP operates in wireless networks, its congestion control algorithms such as fast retransmit recovery (FRR) and… (More)
  • table 1
  • figure 1
  • figure 3
  • figure 4
Is this relevant?
2008
2008
The increased number and diversity of underlying networks have made transparent network migration a necessity. Through its… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • table 2
Is this relevant?
2007
2007
UNLABELLED Some of the concepts contained here have been discussed and incorporated in another publication, but the data are… (More)
Is this relevant?
2006
2006
We address a neural network approach for modeling the behavior of TCP congestion control. After trained with typical data samples… (More)
  • figure 1
  • table I
  • table II
  • table IV
  • table V
Is this relevant?
2004
2004
Highly variable round-trip times (RTTs) in wireless networks can induce spurious timeouts, thus unnecessarily degrading… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2004
2004
The performance of transmission control protocol (TCP) is largely dependent upon its loss recovery. Therefore, it is a very… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2004
2004
We study TCP performance over small-BDP lossy wireless networks. Our model is based on a feedback queue. It is tailored for the… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2000
2000
Burstiness in data traffic is emerging as a critical property that protocol analysis can no longer ignore. To preserve the kind… (More)
  • figure 1
  • figure 5
  • figure 2
  • figure 3
  • figure 4
Is this relevant?