Sciweavers

MASCOTS
2008
13 years 6 months ago
Geographic Constraint Mobility Model for Ad Hoc Network
Sabbir Ahmed, Gour C. Karmakar, Joarder Kamruzzama...
MASCOTS
2008
13 years 6 months ago
Network Information Flow in Network of Queues
Two classic categories of models exist for computer networks: network information flow and network of queues. The network information flow model appropriately captures the multi-ho...
Phillipa Gill, Zongpeng Li, Anirban Mahanti, Jingx...
MASCOTS
2008
13 years 6 months ago
Sensitivity Based Power Management of Enterprise Storage Systems
Energy-efficiency is a key requirement in data centers today. Storage systems constitute a significant fraction of the energy consumed in a data center and therefore enterprise st...
Sriram Sankar, Sudhanva Gurumurthi, Mircea R. Stan
MASCOTS
2008
13 years 6 months ago
Multi-Torrent: A Performance Study
BitTorrent (BT) has become an extremely popular and successful peer-to-peer (P2P) file sharing system. Although empirical evidence suggests that most nodes participate in multiple...
Yan Yang, Alix L. H. Chow, Leana Golubchik
MASCOTS
2008
13 years 6 months ago
Comparison of Single-Rate Multicast Congestion Control Protocols vs ASMP
Christos Bouras, Apostolos Gkamas, Georgios Kioumo...
MASCOTS
2008
13 years 6 months ago
Tackling the Memory Balancing Problem for Large-Scale Network Simulation
A key obstacle to large-scale network simulation over PC clusters is the memory balancing problem where a memory-overloaded machine can slow down an entire simulation due to disk ...
Hyojeong Kim, Kihong Park
MASCOTS
2008
13 years 6 months ago
Lifetime Estimation of Large IEEE 802.15.4 Compliant Wireless Sensor Networks
Lifetime of a wireless sensor network is affected by key factors such as network architecture, network size, sensor node population model, data generation rate, initial battery bu...
Carol Fung, Yanni Ellen Liu
MASCOTS
2008
13 years 6 months ago
Taxis: Scalable Strong Anonymous Communication
Anonymity protocols are a privacy-enhancing technology for Internet-based communication. Two important characteristics of anonymity protocols are the strength of anonymity provide...
Andreas Hirt, Michael J. Jacobson Jr., Carey L. Wi...
MASCOTS
2008
13 years 6 months ago
Operational Analysis of Parallel Servers
:
Terence Kelly, Kai Shen, Alex Zhang, Christopher S...