Wesley M. Eddy

According to our database1, Wesley M. Eddy authored at least 22 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Transmission Control Protocol (TCP).
RFC, August, 2022

2016
Moving Outdated TCP Extensions and TCP-Related Documents to Historic or Informational Status.
RFC, April, 2016

2015
A Roadmap for Transmission Control Protocol (TCP) Specification Documents.
RFC, February, 2015

2012
Investigating operation of the Internet in orbit: Five years of collaboration around CLEO
CoRR, 2012

2011
Using Self-Delimiting Numeric Values in Protocols.
RFC, May, 2011

SYN Flood Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

SYN Cookie Defense.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Taking Saratoga from Space-Based Ground Sensors to Ground-Based Space Sensors
CoRR, 2011

2010
Congestion Control in the RFC Series.
RFC, February, 2010

Experience with Delay-Tolerant Networking from orbit.
Int. J. Satell. Commun. Netw., 2010

Performance Comparison between MIPv6 and SEMO6.
Proceedings of the Global Communications Conference, 2010

Large File Transfers from Space Using Multiple Ground Terminals and Delay-Tolerant Networking.
Proceedings of the Global Communications Conference, 2010

2009
Network Mobility Route Optimization Requirements for Operational Use in Aeronautics and Space Exploration Mobile Networks.
RFC, October, 2009

Sharing the dream.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

2008
Basic properties of the IPv6 AS-level topology.
SIGMETRICS Perform. Evaluation Rev., 2008

2007
TCP SYN Flooding Attacks and Common Mitigations.
RFC, August, 2007

2006
A Roadmap for Transmission Control Protocol (TCP) Specification Documents.
RFC, September, 2006

2004
Explicit transport error notification (ETEN) for error-prone wireless and satellite networks.
Comput. Networks, 2004

At what layer does mobility belong?
IEEE Commun. Mag., 2004

New techniques for making transport protocols robust to corruption-based loss.
Comput. Commun. Rev., 2004

2003
Estimating loss rates with TCP.
SIGMETRICS Perform. Evaluation Rev., 2003

A comparison of RED's byte and packet modes.
Comput. Networks, 2003


  Loading...