Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,300 papers from all fields of science
Search
Sign In
Create Free Account
Traffic flow (computer networking)
Known as:
Flow (computer networking)
, Communication flow
, Packet flow
Expand
In packet switching networks, traffic flow, packet flow or network flow is a sequence of packets from a source computer to a destination, which may…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Argus - Audit Record Generation and Utilization System
Bitstream
Blue (queue management algorithm)
Computer
Expand
Broader (1)
Inter-process communication
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty
K. Bijon
,
Munirul M. Haque
,
Ragib Hasan
Twelfth Annual International Conference on…
2014
Corpus ID: 14202478
In the absence of centralized trusted authorities (CTA), security is one of the foremost concern in Mobile Ad-hoc Networks (MANET…
Expand
2012
2012
Info Capacity| Tracking the Flow of Information into the Home: An Empirical Assessment of the Digital Revolution in the U.S. from 1960–2005
W. R. Neuman
,
Y. Park
,
Elliot T. Panek
2012
Corpus ID: 204315690
This study analyzes the increasing dominance of electronic media in the American media diet and a growing discrepancy between…
Expand
Highly Cited
2009
Highly Cited
2009
Self-Routing Denial-of-Service Resistant Capabilities Using In-packet Bloom Filters
Christian Esteve Rothenberg
,
P. Jokela
,
P. Nikander
,
M. Sarela
,
J. Ylitalo
European Conference on Computer Network Defense
2009
Corpus ID: 15761064
In this paper, we propose and analyze an in-packet Bloom-filter-based source-routing architecture resistant to Distributed Denial…
Expand
2009
2009
Opportunistic Network Coding and Dynamic Buffer Allocation in a Wireless Butterfly Network
Surachai Chieochan
,
E. Hossain
,
T. Issariyakul
,
D. Niyato
Global Communications Conference
2009
Corpus ID: 1220234
We first propose a discrete-time Markov queueing model for a wireless lossy butterfly network which employs opportunistic network…
Expand
Highly Cited
2008
Highly Cited
2008
TDM Virtual-Circuit Configuration for Network-on-Chip
Zhonghai Lu
,
A. Jantsch
IEEE Transactions on Very Large Scale Integration…
2008
Corpus ID: 599262
In network-on-chip (NoC), time-division-multiplexing (TDM) virtual circuits (VCs) have been proposed to satisfy the quality-of…
Expand
2008
2008
An implementation of remote lighting control system based on Zigbee technology and SoC solution
Maoheng Sun
,
Qian Liu
,
Min Jiang
International Conferences on Audio, Language and…
2008
Corpus ID: 8528076
Based on the study of the characteristics of ZigBee technology and the analysis of the structure of wireless sensor networks…
Expand
Review
2008
Review
2008
Challenges and Recent Advances in QoS Provisioning, Signaling, Routing and MAC protocols for MANETs
S. Marwaha
,
J. Indulska
,
M. Portmann
Australasian Telecommunication Networks and…
2008
Corpus ID: 16094899
Mobile ad hoc networks (MANET), which comprise of mobile nodes connected wirelessly, are emerging as a very important technology…
Expand
2007
2007
Multi-Channel Opportunistic Routing
Mathias Kurth
,
J. Redlich
2007
Corpus ID: 16203537
We propose and investigate Multi-Channel Extremely Opportunistic Routing (MCExOR) which is a protocol that extends Extremely…
Expand
Highly Cited
2005
Highly Cited
2005
Predictive congestion control MAC protocol for wireless sensor networks
M. Zawodniok
,
S. Jagannathan
International Conferences on Computing…
2005
Corpus ID: 43326859
Available congestion control schemes, for example transport control protocol (TCP), when applied to wireless networks results in…
Expand
2001
2001
Choosing the UMTS air interface parameters, the voice packet size and the dejittering delay for a voice-over-IP call between a UMTS and a PSTN party
F. Poppe
,
D. D. Vleeschauwer
,
G. Petit
Proceedings IEEE INFOCOM . Conference on Computer…
2001
Corpus ID: 14244818
We develop a methodology to set the VoIP application parameters (voice packet size and dejittering delay) and the UMTS air…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE