Sciweavers

Share
11 search results - page 1 / 3
» The wandering token: Congestion avoidance of a shared resour...
Sort
View
FGCS
2010
108views more  FGCS 2010»
9 years 11 months ago
The wandering token: Congestion avoidance of a shared resource
In a distributed system where scalability is an issue, like in a GRID [5], the problem of enforcing mutual exclusion often arises in a soft form: the infrequent failure of the mut...
Augusto Ciuffoletti

Publication
211views
11 years 11 months ago
Congestion Avoidance in Computer Networks with A Connecitonless Network Layer: Part IV: A Selective Binary Feedback Scheme for G
With increasingly widespread use of computer networks, and the use of varied technology for the interconnection of computers, congestion is a significant problem. In this report, w...
K. Ramakrishnan and R. Jain,
MICRO
2008
IEEE
131views Hardware» more  MICRO 2008»
10 years 7 months ago
Token flow control
As companies move towards many-core chips, an efficient onchip communication fabric to connect these cores assumes critical importance. To address limitations to wire delay scala...
Amit Kumar 0002, Li-Shiuan Peh, Niraj K. Jha
ICC
2007
IEEE
133views Communications» more  ICC 2007»
10 years 7 months ago
A Token-Based Scheduling Scheme for WLANs and Its Performance Analysis
— Most of the existing WLAN MAC protocols can only provide limited service differentiation. In this paper, we propose a novel token-based scheduling scheme for precise and quanti...
Ping Wang, Weihua Zhuang
SIGCOMM
2010
ACM
10 years 1 months ago
NetFence: preventing internet denial of service from inside out
Denial of Service (DoS) attacks frequently happen on the Internet, paralyzing Internet services and causing millions of dollars of financial loss. This work presents NetFence, a s...
Xin Liu, Xiaowei Yang, Yong Xia
books