Publications

Found 519 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
Floyd, S. (2001).  A Report on Some Recent Developments in TCP Congestion Control.
Floyd, S. (2003).  RFC 3649: HighSpeed TCP for Large Congestion Windows.
Floyd, S., & Henderson T. (1999).  The NewReno Modification to TCP's Fast Recovery Algorithm.
Floyd, S., & Allman M. (2007).  Specifying New Congestion Control Algorithms.
Floyd, S., Henderson T., & Gurtov A. (2004).  RFC 3782: The NewReno Modification to TCP's Fast Recovery Algorithm.
Floyd, S., & Jacobson V. (1994).  The Synchronization of Periodic Routing Messages. IEEE/ACM Transactions on Networking. 2(2), 122-136.
Floyd, S., Kohler E., & Padhye J. (2006).  RFC 4342: Profile for Datagram Congestion Control Protocol (DCCP) Congestion Control ID 3: TCP-Friendly Rate Control (TFRC).
Floyd, S. (2002).  RFC 3360: Inappropriate TCP Resets Considered Harmful.
Floyd, S. (2006).  RFC 4774: Specifying Alternate Semantics for the Explicit Congestion Notification (ECN) Field.
Floyd, S. (1996).  Comments on Measurement-based Admissions Control for Controlled-Load Services.
Floyd, S., & Kohler E. (2007).  RFC 4828: TCP Friendly Rate Control (TFRC): the Small-Packet (SP) Variant.
Floyd, S., & Fall K. (1999).  Promoting the Use of End-to-End Congestion Control in the Internet. IEEE/ACM Transactions on Networking.
Floyd, S. (2004).  RFC 3742: Limited Slow-Start for TCP with Large Congestion Windows.
Floyd, S. (1994).  TCP and Explicit Congestion Notification. ACM Computer Communication Review. 24(5), 10-23.
Floyd, S., Handley M., Padhye J., & Widmer J. (2000).  Equation-Based Congestion Control for Unicast Applications: the Extended Version.
[Anonymous] (2006).  RFC 4440: IAB Thoughts on the Role of the Internet Research Task Force (IRTF). (Floyd, S., Paxson V., & Falk A., Ed.).
[Anonymous] (2002).  RFC 3426: General Architectural and Policy Considerations. (Floyd, S., Ed.).
Fonseca, R., Ratnasamy S., Zhao J., Ee C. Tien, Culler D. E., Shenker S. J., et al. (2005).  Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 329-342.
Fonseca, R., Porter G. Manning, Katz R. H., Shenker S. J., & Stoica I. (2007).  X-Trace: A Pervasive Network Tracing Framework. Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007). 271-284.
Fonseca, R., Porter G. Manning, Katz R. H., Shenker S. J., & Stoica I. (2005).  IP Options are not an Option.
M. Font, F. (2005).  Multi-Microphone Signal Processing for Automatic Speech Recognition in Meeting Rooms.
Foraker, S., Regier T., Khetarpal N., Perfors A., & Tenenbaum J. (2009).  Indirect Evidence and the Poverty of the Stimulus: The Case of Anaphoric One. Cognitive Science. 33(2), 287-300.
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Formella, A. (1994).  Some MPEG Decoding Functions on Spert - An Example for Assembly Programmers.
Fornasa, M., Stecca M., Maresca M., & Baglietto P. (2015).  Bounded Latency Spanning Tree Reconfiguration. Computer Networks. 76, 259-274.

Pages