Sciweavers

2485 search results - page 347 / 497
» A Communicating Tree Model for Generating Network Applicatio...
Sort
View
JCM
2008
101views more  JCM 2008»
15 years 3 months ago
WiMAX: The Innovative Broadband Wireless Access Technology
The telecommunication industry has been through disruptive times, but data networking service revenue has continued to rise. The telecom industry is expected to continue to grow as...
Abdulrahman Yarali, Saifur Rahman, Bwanga Mbula
AAAI
2012
13 years 6 months ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...
TSP
2010
14 years 10 months ago
Statistics of Co-Channel Interference in a Field of Poisson and Poisson-Poisson Clustered Interferers
Abstract--With increasing spatial reuse of radio spectrum, cochannel interference is becoming a dominant noise source and may severely degrade the communication performance of wire...
Kapil Gulati, Brian L. Evans, Jeffrey G. Andrews, ...
ESTIMEDIA
2007
Springer
15 years 10 months ago
Network Calculus Applied to Verification of Memory Access Performance in SoCs
SoCs for multimedia applications typically use only one port to off-chip DRAM for cost reasons. The sharing of interconnect and the off-chip DRAM port by several IP blocks makes t...
Tomas Henriksson, Pieter van der Wolf, Axel Jantsc...
DSN
2004
IEEE
15 years 7 months ago
Robust Aggregation Protocols for Large-Scale Overlay Networks
Aggregation refers to a set of functions that provide global information about a distributed system. These functions operate on numeric values distributed over the system and can ...
Alberto Montresor, Márk Jelasity, Özal...