Reducing web latency: the virtue of gentle aggression
To serve users quickly, Web service providers build infrastructure closer to clients and use
multi-stage transport connections. Although these changes reduce client-perceived round …
multi-stage transport connections. Although these changes reduce client-perceived round …
Contention resolution with log-logstar channel accesses
For decades, randomized exponential backoff has provided a critical algorithmic building
block in situations where multiple devices seek access to a shared resource. Surprisingly …
block in situations where multiple devices seek access to a shared resource. Surprisingly …
How to scale exponential backoff: Constant throughput, polylog access attempts, and robustness
Randomized exponential backoff is a widely deployed technique for coordinating access to
a shared resource. A good backoff protocol should, arguably, satisfy three natural …
a shared resource. A good backoff protocol should, arguably, satisfy three natural …
Contention resolution without collision detection
This paper focuses on the contention resolution problem on a shared communication
channel that does not support collision detection. A shared communication channel is a …
channel that does not support collision detection. A shared communication channel is a …
Multipath aggregation of heterogeneous access networks
D Kaspar - ACM SIGMultimedia Records, 2012 - dl.acm.org
The explosive deployment of wired and wireless communication infrastructure has recently
enabled many novel applications and sparked new research problems. One of the unsolved …
enabled many novel applications and sparked new research problems. One of the unsolved …
Scaling exponential backoff: constant throughput, polylogarithmic channel-access attempts, and robustness
Randomized exponential backoff is a widely deployed technique for coordinating access to
a shared resource. A good backoff protocol should, arguably, satisfy three natural …
a shared resource. A good backoff protocol should, arguably, satisfy three natural …
A longitudinal view of http traffic
In this paper we analyze three and a half years of HTTP traffic observed at a small research
institute to characterize the evolution of various facets of web operation. While our dataset is …
institute to characterize the evolution of various facets of web operation. While our dataset is …
Contention resolution with constant throughput and log-logstar channel accesses
For decades, randomized exponential backoff has provided a critical algorithmic building
block in situations where multiple devices seek access to a shared resource. Despite this …
block in situations where multiple devices seek access to a shared resource. Despite this …
Contention resolution with message deadlines
In the contention-resolution problem, multiple players contend for access to a shared
resource. Contention resolution is used in wireless networks, where messages must be …
resource. Contention resolution is used in wireless networks, where messages must be …
Windowed backoff algorithms for WiFi: theory and performance under batched arrivals
WC Anderton, T Chakraborty, M Young - Distributed Computing, 2021 - Springer
Binary exponential backoff (BEB) is a decades-old algorithm for coordinating access to a
shared channel. In modern networks, BEB plays a crucial role in WiFi and other wireless …
shared channel. In modern networks, BEB plays a crucial role in WiFi and other wireless …