Sciweavers

48 search results - page 9 / 10
» Hide and Seek in Time - Robust Covert Timing Channels
Sort
View
ISCA
2002
IEEE
91views Hardware» more  ISCA 2002»
13 years 10 months ago
Slack: Maximizing Performance Under Technological Constraints
Many emerging processor microarchitectures seek to manage technological constraints (e.g., wire delay, power, and circuit complexity) by resorting to nonuniform designs that provi...
Brian A. Fields, Rastislav Bodík, Mark D. H...
INFOCOM
2008
IEEE
13 years 11 months ago
Is Random Network Coding Helpful in WiMAX?
—The IEEE 802.16 standard, or WiMAX, has emerged to facilitate high-bandwidth wireless access in realworld metropolitan areas, commonly referred to as 4G. In WiMAX, Hybrid Automa...
Jin Jin, Baochun Li, Taegon Kong
WSC
2000
13 years 6 months ago
Cost/benefit analysis of interval jumping in power-control simulation
Computation of power control calculations is one of the most time-consuming aspects of simulating wireless communication systems. These calculations are critical to understanding ...
David M. Nicol, L. Felipe Perrone
INFOCOM
2005
IEEE
13 years 10 months ago
Optimal utility based multi-user throughput allocation subject to throughput constraints
— We consider the problem of scheduling multiple users sharing a time-varying wireless channel. (As an example, this is a model of scheduling in 3G wireless technologies, such as...
Matthew Andrews, Lijun Qian, Alexander L. Stolyar
LCN
2008
IEEE
13 years 11 months ago
WBest: A bandwidth estimation tool for IEEE 802.11 wireless networks
—Bandwidth estimation techniques seek to provide an accurate estimation of available bandwidth such that network applications can adjust their behavior accordingly. However, most...
Mingzhe Li, Mark Claypool, Robert E. Kinicki