Wesley M. Eddy

According to our database1, Wesley M. Eddy authored at least 22 papers between 2002 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Moving Outdated TCP Extensions and TCP-Related Documents to Historic or Informational Status.
RFC, April, 2016

2015
A Roadmap for Transmission Control Protocol (TCP) Specification Documents.
RFC, February, 2015

2012
Investigating operation of the Internet in orbit: Five years of collaboration around CLEO
CoRR, 2012

2011
Using Self-Delimiting Numeric Values in Protocols.
RFC, May, 2011

SYN Flood Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

SYN Cookie Defense.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Taking Saratoga from Space-Based Ground Sensors to Ground-Based Space Sensors
CoRR, 2011

2010
Congestion Control in the RFC Series.
RFC, February, 2010

Experience with Delay-Tolerant Networking from orbit.
Int. J. Satellite Communications Networking, 2010

Performance Comparison between MIPv6 and SEMO6.
Proceedings of the Global Communications Conference, 2010

Large File Transfers from Space Using Multiple Ground Terminals and Delay-Tolerant Networking.
Proceedings of the Global Communications Conference, 2010

2009
Network Mobility Route Optimization Requirements for Operational Use in Aeronautics and Space Exploration Mobile Networks.
RFC, October, 2009

Sharing the dream.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

2008
Basic properties of the IPv6 AS-level topology.
SIGMETRICS Performance Evaluation Review, 2008

2007
TCP SYN Flooding Attacks and Common Mitigations.
RFC, August, 2007

2006
A Roadmap for Transmission Control Protocol (TCP) Specification Documents.
RFC, September, 2006

2004
Explicit transport error notification (ETEN) for error-prone wireless and satellite networks.
Computer Networks, 2004

At what layer does mobility belong?
IEEE Communications Magazine, 2004

New techniques for making transport protocols robust to corruption-based loss.
Computer Communication Review, 2004

2003
Estimating loss rates with TCP.
SIGMETRICS Performance Evaluation Review, 2003

A comparison of RED's byte and packet modes.
Computer Networks, 2003

2002
A comparison of RED's byte and packet modes.
Computer Communication Review, 2002


  Loading...