Sciweavers

981 search results - page 56 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
SIGMETRICS
2011
ACM
237views Hardware» more  SIGMETRICS 2011»
14 years 1 months ago
Analysis of DCTCP: stability, convergence, and fairness
Cloud computing, social networking and information networks (for search, news feeds, etc) are driving interest in the deployment of large data centers. TCP is the dominant Layer 3...
Mohammad Alizadeh, Adel Javanmard, Balaji Prabhaka...
ICFEM
2010
Springer
14 years 9 months ago
A Methodology for Automatic Diagnosability Analysis
We present an algorithm based on temporal-epistemic model checking combined with fault injection to analyse automatically the diagnosability of faults by agents in the system. We d...
Jonathan Ezekiel, Alessio Lomuscio
ICASSP
2011
IEEE
14 years 2 months ago
Robust talking face video verification using joint factor analysis and sparse representation on GMM mean shifted supervectors
It has been previously demonstrated that systems based on block wise local features and Gaussian mixture models (GMM) are suitable for video based talking face verification due t...
Ming Li, Shrikanth Narayanan
SECURWARE
2008
IEEE
15 years 5 months ago
Formal Modeling of Authentication in SIP Registration
The Session Initiation Protocol (SIP) is increasingly used as a signaling protocol for administrating Voice over IP (VoIP) phone calls. SIP can be configured in several ways so t...
Anders Moen Hagalisletto, Lars Strand
COMCOM
2006
103views more  COMCOM 2006»
14 years 11 months ago
Energy efficiency of collision resolution protocols
Energy consumption of the medium access control (MAC) algorithm is one of the key performance metrics in today's ubiquitous wireless networks of battery-operated devices. We ...
Aran Bergman, Moshe Sidi