Results 181 to 190 of about 96,922 (234)
Evaluating GNSS infrastructure readiness for IGS contribution: the case of King Sejong Station, Antarctica. [PDF]
Lee SJ, Yun HS, Yoon HM, Lee SH.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Multipath QUIC: A Deployable Multipath Transport Protocol
2018 IEEE International Conference on Communications (ICC), 2018QUIC is the emerging transport layer protocol, providing encrypted, stream-multiplexed, low-latency data transfer. In this paper, we propose multipath-enabled QUIC (MPQUIC) to leverage multiple network interfaces, such as WiFi and LTE on today's mobile devices.
Tobias Viernickel +4 more
openaire +1 more source
Experimenting with multipath TCP
ACM SIGCOMM Computer Communication Review, 2010It is becoming the norm for small mobile devices to have access to multiple technologies for connecting to the Internet. This gives researchers an increasing interest for solutions allowing to use efficiently several communication mediums. We propose a demonstration of our Multipath TCP implementation for Linux, that allows spreading a single TCP flow ...
Sébastien Barré +3 more
openaire +2 more sources
Proceedings of the 2013 workshop on Hot topics in middleboxes and network function virtualization, 2013
Multipath TCP (MPTCP) is a major modification to TCP that enables a single transport connection to use multiple paths. Smartphones can benefit from MPTCP by using both WiFi and 3G/4G interfaces for their data-traffic, potentially improving the performance and allowing mobility through vertical handover. However, MPTCP requires a modification of the end
Detal G., Paasch C., Bonaventure O.
openaire +1 more source
Multipath TCP (MPTCP) is a major modification to TCP that enables a single transport connection to use multiple paths. Smartphones can benefit from MPTCP by using both WiFi and 3G/4G interfaces for their data-traffic, potentially improving the performance and allowing mobility through vertical handover. However, MPTCP requires a modification of the end
Detal G., Paasch C., Bonaventure O.
openaire +1 more source
1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings, 2002
In a multipath communication channel, the optimal receiver is matched to the maximum likelihood (ML) estimate of the multipath signal. In general, this leads to a computationally intensive multi-dimensional nonlinear optimisation problem. We develop a detection algorithm that avoids the ML estimation while still achieving good performance. Our approach
Chuang He +2 more
openaire +1 more source
In a multipath communication channel, the optimal receiver is matched to the maximum likelihood (ML) estimate of the multipath signal. In general, this leads to a computationally intensive multi-dimensional nonlinear optimisation problem. We develop a detection algorithm that avoids the ML estimation while still achieving good performance. Our approach
Chuang He +2 more
openaire +1 more source
Computers & Geosciences, 2010
Abstract The very long baseline interferometry (VLBI) technique currently demands data storage resources of about 2 TBytes per day which must be analyzed in correlation centers. The current process involves the physical storing and shipping of magnetic disks to these centers, where up to 5 days are needed for transportation.
Sergio K. Sobarzo +2 more
openaire +1 more source
Abstract The very long baseline interferometry (VLBI) technique currently demands data storage resources of about 2 TBytes per day which must be analyzed in correlation centers. The current process involves the physical storing and shipping of magnetic disks to these centers, where up to 5 days are needed for transportation.
Sergio K. Sobarzo +2 more
openaire +1 more source
2021
In a multipath key exchange protocol (Costea et al., CCS’18) the parties communicate over multiple connection lines, implemented for example with the multipath extension of TCP. Costea et al. show that, if one assumes that an adversary cannot attack all communication paths in an active and synchronized way, then one can securely establish a shared key ...
Marc Fischlin +3 more
openaire +1 more source
In a multipath key exchange protocol (Costea et al., CCS’18) the parties communicate over multiple connection lines, implemented for example with the multipath extension of TCP. Costea et al. show that, if one assumes that an adversary cannot attack all communication paths in an active and synchronized way, then one can securely establish a shared key ...
Marc Fischlin +3 more
openaire +1 more source

