Sciweavers

ANSS
2008
IEEE
13 years 10 months ago
Beyond the Model of Persistent TCP Flows: Open-Loop vs Closed-Loop Arrivals of Non-persistent Flows
It is common for simulation and analytical studies to model Internet traffic as an aggregation of mostly persistent TCP flows. In practice, however, flows follow a heavytailed ...
Ravi S. Prasad, Constantine Dovrolis
ANSS
2008
IEEE
13 years 10 months ago
Simulation of Buffer Management Policies in Networks for Grids
Grid technologies are emerging as the next generation of distributed computing, allowing the aggregation of resources that are geographically distributed across different location...
Agustín C. Caminero, Anthony Sulistio, Blan...
ANSS
2008
IEEE
13 years 10 months ago
Resource Allocation Strategies in a 2-Level Hierarchical Grid System
Efficient job scheduling in grids is challenging due to the large number of distributed autonomous resources. In this paper we study various resource allocation policies in a 2-le...
Stylianos Zikos, Helen D. Karatza
ANSS
2008
IEEE
13 years 10 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
ANSS
2008
IEEE
13 years 10 months ago
A Simulation Study of Common Mobility Models for Opportunistic Networks
Understanding mobility characteristics is important for the design and analysis of routing schemes for mobile ad hoc networks (MANETs). This is especially true for mobile opportun...
Muhammad Abdulla, Robert Simon
ANSS
2008
IEEE
13 years 10 months ago
Executable Protocol Models as a Requirements Engineering Tool
Functional prototypes and simulations are a well recognised and valued tool for building a shared understanding of requirements between users and developers. However, the developm...
Ashley T. McNeile, Ella E. Roubtsova