1998
DOI: 10.1109/49.669053
|View full text |Cite
|
Sign up to set email alerts
|

Protocol boosters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

1998
1998
2009
2009

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 84 publications
(34 citation statements)
references
References 12 publications
0
34
0
Order By: Relevance
“…Work in [FMSBMR98] shows a range of other possible PEP mechanisms called protocol boosters. Some of these mechanisms are specific to UDP flows.…”
Section: Protocol Booster Mechanismsmentioning
confidence: 99%
“…Work in [FMSBMR98] shows a range of other possible PEP mechanisms called protocol boosters. Some of these mechanisms are specific to UDP flows.…”
Section: Protocol Booster Mechanismsmentioning
confidence: 99%
“…Surprisingly, there are very few active network projects that exploit the active nodes' capability of application-specific packet processing to improve quality of Internet voice or audio transmissions. The work we are aware of is [BET98], [FMSB98], [MHMS98]. In [BET98] active nodes add an optimal amount of redundant data on a per-link basis to protect audio streams against packet loss.…”
Section: Related Workmentioning
confidence: 99%
“…Active Networks follows the approach first proposed in the "Protocol Boosters" project [6], of enabling on-the-fly modifiScott Alexander, William Arbaugh, and Angelos Keromytis are each working toward a Ph.D. in Computer and Information Science at the University of Pennsylvania.…”
Section: Introductionmentioning
confidence: 99%