Sciweavers

981 search results - page 104 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
ICNS
2009
IEEE
15 years 6 months ago
Analysis and Experimental Evaluation of Data Plane Virtualization with Xen
Combining end-host, server and router virtualization could offer isolated and malleable virtual networks of different types, owners and protocols, all sharing one physical infrast...
Fabienne Anhalt, Pascale Vicat-Blanc Primet
DFT
2003
IEEE
145views VLSI» more  DFT 2003»
15 years 4 months ago
System-Level Analysis of Fault Effects in an Automotive Environment
In the last years, new requirements in terms of vehicle performance increased significantly the amount of on-board electronics, thus raising more concern about safety and fault to...
Fulvio Corno, S. Tosato, P. Gabrielli
AINA
2009
IEEE
15 years 6 months ago
Opportunistic Routing for Disruption Tolerant Networks
—Opportunistic networks represent one of the most interesting evolution of MANET paradigm. Generally speaking, opportunistic networks enable user communication in environments wh...
Marcello Caleffi, Luigi Paura
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 5 months ago
Filtering Spam Email Based on Retry Patterns
— A central problem in today’s Internet is unsolicited bulk email: spam. The SMTP protocol lacks a mechanism for verifying the source of a message, and respective protocol exte...
Peter Lieven, Björn Scheuermann, Michael Stin...
EUC
2006
Springer
15 years 2 months ago
Prediction Efficiency in Predictive p-CSMA/CD
Predictive p-persistent CSMA protocol is an important MAC solution developed for networked sensor/control applications and used in Local Operating Networks (LonWorks) technology. T...
Marek Miskowicz