Sciweavers

981 search results - page 164 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
PEWASUN
2005
ACM
15 years 4 months ago
An error model for inter-vehicle communications in highway scenarios at 5.9GHz
The design and evaluation of Inter-Vehicle Communication (IVC) protocols rely much on the accurate and efficient computational simulations. For simulations of Medium Access Contro...
Yunpeng Zang, Lothar Stibor, Georgios Orfanos, Shu...
72
Voted
WISA
2004
Springer
15 years 4 months ago
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
Abstract. Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against trafï...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
ICPP
2002
IEEE
15 years 4 months ago
Linux/SimOS - A Simulation Environment for Evaluating High-Speed Communication Systems
This paper presents Linux/SimOS, a Linux operating system port to SimOS, which is a complete machine simulator from Stanford. The motivation for Linux/SimOS is to alleviate the li...
Chulho Won, Ben Lee, Chansu Yu, Sangman Moh, Yong-...
93
Voted
INFOCOM
2000
IEEE
15 years 3 months ago
Stochastic Modeling of TCP over Lossy Links
—An analytical framework for modeling the performance of a single TCP session in the presence of random packet loss is presented. A Markovian approach is developed that allows us...
Alhussein A. Abouzeid, Sumit Roy, Murat Azizoglu
GRAPHICSINTERFACE
2008
15 years 16 days ago
Order and entropy in picture passwords
Previous efforts involving picture-based passwords have not focused on maintaining a measurably high level of entropy. Since password systems usually allow user selection of passw...
Saranga Komanduri, Dugald Ralph Hutchings