Sciweavers

124 search results - page 23 / 25
» An Analysis of the Degradation of Anonymous Protocols
Sort
View
MSWIM
2005
ACM
13 years 11 months ago
Adaptive transmission opportunity with admission control for IEEE 802.11e networks
The increase of IEEE 802.11’s bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints...
Adlen Ksentini, Abdelhak Guéroui, Mohamed N...
NETWORKING
2004
13 years 7 months ago
Performance of Directional Collision Avoidance in Ad Hoc Networks
Abstract. This paper analyzes the performance of directional collision avoidance schemes, in which antenna systems are used to direct the transmission and reception of control and ...
Yu Wang 0007, J. J. Garcia-Luna-Aceves
IPPS
2005
IEEE
13 years 11 months ago
Characterizing Secure Dynamic Web Applications Scalability
Security in the access to web contents and the interaction with web sites is becoming one of the most important issues in Internet. Servers need to provide certain levels of secur...
Jordi Guitart, Vicenç Beltran, David Carrer...
PADS
2004
ACM
13 years 11 months ago
Conservative Synchronization of Large-Scale Network Simulations
Parallel discrete event simulation techniques have enabled the realization of large-scale models of communication networks containing millions of end hosts and routers. However, t...
Alfred Park, Richard M. Fujimoto, Kalyan S. Peruma...
CCGRID
2008
IEEE
14 years 13 days ago
Xen-Based HPC: A Parallel I/O Perspective
Virtualization using Xen-based virtual machine environment has yet to permeate the field of high performance computing (HPC). One major requirement for HPC is the availability of ...
Weikuan Yu, Jeffrey S. Vetter