By Topic

2009 IEEE International Workshop Technical Committee on Communications Quality and Reliability

Date 12-14 May 2009

Filter Results

Displaying Results 1 - 11 of 11
  • Improvement of RTT-fairness in Hybrid TCP congestion control

    Publication Year: 2009, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7262 KB) | HTML iconHTML

    This paper presents TCP-fusion supporting RTT (round trip time) fairness in addition to throughput efficiency and friendliness to TCP-Reno. When multiple TCP flows having different RTT values compete, more bandwidth is unfairly allocated to the flow having smaller RTT. This means that a user with longer RTT may not be able to obtain sufficient bandwidth by the current methods. On the other hand, r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantifying software reliability and readiness

    Publication Year: 2009, Page(s):1 - 6
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3628 KB) | HTML iconHTML

    As the industry moves to more mature software processes (e.g., CMMI) there is increased need to adopt more rigorous, sophisticated (i.e., quantitative) metrics. While quantitative product readiness criteria are often used for business cases and related areas, software readiness is often assessed more subjectively & qualitatively. Quite often there is no explicit linkage to original performance... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational quality model for wideband voice-over-IP communications

    Publication Year: 2009, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (377 KB) | HTML iconHTML

    The e-model is a computational tool standardized by the ITU and developed to estimate the quality of VoIP communications. The objective of this model is to determine a voice quality rating that incorporates the quality of encoding processes and the mouth-to-ear characteristics of a path along a given call. The model was originally developed for narrowband 4-kHz telephony. This paper discusses a ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The notion of cost and quality in packet switched networks: An abstract approach

    Publication Year: 2009, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5051 KB) | HTML iconHTML

    The notion of quality is an important factor in the design of any complex communication system. Since most communication systems are increasingly dependent on packet switching as the underlying transport mechanism, this paper explores the impact of levels of quality that a packet switched system can have on cost. Several interesting results are presented that result in the notion of an optimum lev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An exact optimization tool for market-oriented grid middleware

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    With the fast growth of grid service demands, an efficient resource management mechanism is required. Business-oriented algorithms were shown to be adequate to resolve such a problem. Business models mainly consider the problem of computing, storage and network resources virtualization. This paper investigates the problem of resource allocation under flexible traffic in market-oriented grids. We c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accuracy improvement of multi-stage change-point detection scheme by weighting alerts based on false-positive rate

    Publication Year: 2009, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1259 KB) | HTML iconHTML

    One promising approach for large-scale simultaneous events (e.g., DDoS attacks and worm epidemics) is to use a multi-stage change-point detection scheme. The scheme adopts two-stage detection. In the first stage, local detectors (LDs), which are deployed on each monitored subnet, detects a change point in a monitored metric such as outgoing traffic rate. If an LD detects a change-point, it sends a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intentional window flow control for proxy-based TCP in ad hoc networks

    Publication Year: 2009, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2048 KB) | HTML iconHTML

    In ad hoc wireless networks, end-to-end TCP is well-known that it can obtain very low throughput with increase of the number of hops. One promising way to resolve this technical problem of TCP throughput degradation is proxy-based TCP. In proxy-based TCP, an end-to-end TCP session is divided by (an) intermediate proxy host(s), which leads to reduction of hop-count of each divided session and impro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting the quality of voice over IP networks

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB) | HTML iconHTML

    Clients have still hesitated to switch conventional phone service with voice over IP networks (VoIP) service because VoIP service providers are not successful in providing consistent quality during a call. The uncertainness of IP networks, the legacy of packet-switched networks, makes it hard to predict service quality and demands real-time based monitoring. In this paper, we propose a prediction ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proof of optimal algorithm for maximum-bandwidth ALM tree construction

    Publication Year: 2009, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (893 KB) | HTML iconHTML

    We construct an ALM (application layer multicast) tree that achieves the maximum bandwidth by using underlay traffic information. Since this problem was previously shown to be NP-hard, no polynomial-time algorithms for maximum-bandwidth ALM tree construction exist. In our work, we assume that the underlay network has a tree network topology, and we show a polynomial-time algorithm that constructs ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measurement based QoS comparison of cellular communication networks

    Publication Year: 2009, Page(s):1 - 5
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (447 KB) | HTML iconHTML

    A quality of service (QoS) assessment methodology for cellular communication networks is described. The methodology is based on the data collected through drive testing; it is focused on the end user perception of service quality and it is independent of access technologies implemented by the cellular networks. QoS assessment for both the circuit switched and packet switched side of the network is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (8 KB)
    Freely Available from IEEE