Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,143,269 papers from all fields of science
Search
Sign In
Create Free Account
End-to-end principle
Known as:
End to end argument
, End-to-end argument
, End-to-end connection
Expand
The end-to-end principle is a classic design principle in computer networking. In networks designed according to the principle, application-specific…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Acknowledgement (data networks)
Application delivery network
Argus - Audit Record Generation and Utilization System
Automatic repeat request
Expand
Broader (2)
Net neutrality
Network architecture
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
A study and comparison of OLSR, AODV and TORA routing protocols in ad hoc networks
P. Kuppusamy
,
K. Thirunavukkarasu
,
B. Kalaavathi
International Conference on Electronic Computer…
2011
Corpus ID: 16008919
Mobile Ad hoc Network (MANET) is a collection of mobile nodes in which the wireless links are frequently broken down due to…
Expand
Highly Cited
2011
Highly Cited
2011
End-to-end protocols for Cognitive Radio Ad Hoc Networks: An evaluation study
M. D. Felice
,
K. Chowdhury
,
Wooseong Kim
,
A. Kassler
,
L. Bononi
Performance evaluation (Print)
2011
Corpus ID: 17134198
Highly Cited
2009
Highly Cited
2009
End-to-End Energy–Bandwidth Tradeoff in Multihop Wireless Networks
C. Bae
,
W. Stark
IEEE Transactions on Information Theory
2009
Corpus ID: 1716147
In this paper, energy-constrained wireless multihop networks with a single source-destination pair are considered. A network…
Expand
Highly Cited
2007
Highly Cited
2007
System architecture and cross-layer optimization of video broadcast over WiMAX
Jianfeng Wang
,
M. Venkatachalam
,
Yuguang Fang
IEEE Journal on Selected Areas in Communications
2007
Corpus ID: 9747208
Video broadcast and mobile TV have received significant interests from both academia and industry recently. The emerging mobile…
Expand
Highly Cited
2007
Highly Cited
2007
On the Distortion SNR Exponent of Hybrid Digital–Analog Space–Time Coding
G. Caire
,
K. Narayanan
IEEE Transactions on Information Theory
2007
Corpus ID: 18613884
We consider the transmission of a real independent and identically distributed (i.i.d.) "analog" source over a quasi-static M…
Expand
Highly Cited
2005
Highly Cited
2005
Throughput Optimal Control of Cooperative Relay Networks
E. Yeh
,
R. Berry
IEEE Transactions on Information Theory
2005
Corpus ID: 15678661
In cooperative relaying, multiple nodes cooperate to forward a packet within a network. To date, such schemes have been primarily…
Expand
Highly Cited
2004
Highly Cited
2004
An implementation of wireless sensor network
Soo-Hwan Choi
,
Byung-Kug Kim
,
Jinwoo Park
,
C. Kang
,
D. Eom
IEEE transactions on consumer electronics
2004
Corpus ID: 5166370
In recent years, the advances in wireless communication and electronics have accelerated to develop many wireless network…
Expand
Highly Cited
2004
Highly Cited
2004
Simulation Comparison of Four Wireless Ad hoc Routing Protocols
S. Sesay
,
Zongkai Yang
,
Biao Qi
,
Jianhua He
2004
Corpus ID: 59365781
Mobile Ad hoc-networking (MANET) is becoming increasingly important in today's world and a number of protocols have been…
Expand
Highly Cited
2002
Highly Cited
2002
Routing through the mist: privacy preserving communication in ubiquitous computing environments
J. Al-Muhtadi
,
R. Campbell
,
Apu Kapadia
,
M. D. Mickunas
,
Seung Yi
Proceedings 22nd International Conference on…
2002
Corpus ID: 2648878
Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns…
Expand
Highly Cited
1999
Highly Cited
1999
Analysis of HTTP Performance
J. Touch
,
J. Heidemann
,
K. Obraczka
1999
Corpus ID: 6086957
We discuss the performance effects of using per-transaction TCP connections for HTTP access, and the proposed optimizations of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE