Sciweavers

981 search results - page 115 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
FORTE
2008
15 years 23 days ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...
SIGMETRICS
2006
ACM
121views Hardware» more  SIGMETRICS 2006»
15 years 5 months ago
Transient analysis of tree-Like processes and its application to random access systems
A new methodology to assess transient performance measures of tree-like processes is proposed by introducing the concept of tree-like processes with marked time epochs. As opposed...
Jeroen Van Velthoven, Benny Van Houdt, Chris Blond...
ICNP
2003
IEEE
15 years 4 months ago
Delay Analysis of IEEE 802.11 in Single-Hop Networks
This paper presents an analytical model to compute the average service time and jitter experienced by a packet when transmitted in a saturated IEEE 802.11 ad hoc network. In contr...
Marcelo M. Carvalho, J. J. Garcia-Luna-Aceves
RAID
2000
Springer
15 years 2 months ago
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. Three weeks of training and two weeks of test data were generated on a test ...
Richard Lippmann, Joshua W. Haines, David J. Fried...
FGCS
2006
121views more  FGCS 2006»
14 years 11 months ago
Real-time multi-scale brain data acquisition, assembly, and analysis using an end-to-end OptIPuter
At iGrid 2005 we demonstrated the transparent operation of a biology experiment on a test-bed of globally distributed visualization, storage, computational, and network resources....
Rajvikram Singh, Nicholas Schwarz, Nut Taesombut, ...