Zobrazeno 1 - 10
of 87
pro vyhledávání: '"Christian Tschudin"'
Autor:
Evgeny Osipov, Christian Tschudin
Publikováno v:
Journal of Communications Software and Systems, Vol 2, Iss 4, Pp 294-304 (2006)
One of the stumbling blocks which prevents multihop ad hoc networks from wide deployment is a known problem of unfair bandwidth distribution between competing data sessions. Practically, a combination of the current IEEE 802.11 technology and the sta
Externí odkaz:
https://doaj.org/article/d0ee4df4155f49fd98806e3e93fc3b5d
Autor:
Evgeny Osipov, Christian Tschudin
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2007 (2007)
This article addresses a problem of the severe unfairness between multiple TCP sessions in a wireless context also known as “TCP capture†phenomenon. We present an adapted max-min fairness framework to the specifics of MANETs. W
Externí odkaz:
https://doaj.org/article/2ab1631aaad344a9ad6518aea94db808
Autor:
Erick Lavoie, Christian Tschudin
Publikováno v:
Proceedings of the 3rd International Workshop on Distributed Infrastructure for the Common Good.
Autor:
Christian Tschudin
Publikováno v:
Proceedings of the 3rd International Workshop on Distributed Infrastructure for the Common Good.
Publikováno v:
Journal of Network and Systems Management. 28:298-339
Load balancing is a mechanism to distribute client requests among several service instances. It enables resource utilization, lowers response time, and increases user satisfaction. In Named-Data Networking (NDN) and NDN-like architectures, load balan
Publikováno v:
ICN
Today's Internet is heavily used for multimedia streaming from cloud backends, while the Internet of Things (IoT) challenges the traditional data flow, with high data volumes produced at the network edge. Information Centric Networking (ICN) advocate
Autor:
Christian Tschudin, Fabrizio Parrillo
Publikováno v:
Networking
Solid is a moderate re-decentralization architecture for the Web. In Solid, applications fetch data from storage providers called “pods” which implement discretionary access control, permitting users to grant and revoke access rights and thus kee
Autor:
Christian Tschudin
Publikováno v:
ACM SIGCOMM Computer Communication Review. 49:37-43
This note is about the interplay between a data structure, the append-only log, and a broadcasting communication abstraction that seems to induce it. We identified real-world systems which have started to exploit this configuration and highlight its
Publikováno v:
IEEE Communications Magazine. 56:69-75
In this article, we focus on in-network function execution in information-centric networking (ICN), and we highlight the open issues for secure distributed computing given an ICN substrate. Within such an ICN-based ecosystem, we present an exemplary
Publikováno v:
DICG@Middleware
Middlewares for building social applications, in which infrastructure is provided by participants, are currently developed by open-source communities. Among those, Secure-Scuttlebutt has pioneered the use of replicated authenticated single-writer app