Sciweavers

374 search results - page 10 / 75
» A Model of Fair Process and Its Limits
Sort
View
NETWORKING
2008
15 years 1 months ago
Towards an ISP-Compliant, Peer-Friendly Design for Peer-to-Peer Networks
Peer-to-peer (P2P) applications are consuming a significant fraction of the total bandwidth of Internet service providers (ISPs). This has become a financial burden to ISPs and if ...
Haiyong Xie 0002, Yang Richard Yang, Avi Silbersch...
INFOCOM
2011
IEEE
14 years 3 months ago
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
Jin Tang, Yu Cheng, Weihua Zhuang
CSCW
1994
ACM
15 years 3 months ago
Session Management for Collaborative Applications
Session management systems for collaborative applications have required a great deal of reimplementation work by developers because they have been typically created on a case-by-c...
W. Keith Edwards
ADC
2004
Springer
106views Database» more  ADC 2004»
15 years 5 months ago
Customizing Internal Activity Behaviour for Flexible Process Enforcement
Workflow technology has met with success in a variety of industries, although several limitations have emerged. One such drawback is the inflexibility of specification languages, ...
Belinda M. Carter, Joe Y.-C. Lin, Maria E. Orlowsk...
MICRO
1998
IEEE
129views Hardware» more  MICRO 1998»
15 years 4 months ago
A Bandwidth-efficient Architecture for Media Processing
Media applications are characterized by large amounts of available parallelism, little data reuse, and a high computation to memory access ratio. While these characteristics are p...
Scott Rixner, William J. Dally, Ujval J. Kapasi, B...