Sciweavers

2493 search results - page 485 / 499
» A survey of network virtualization
Sort
View
TON
2008
103views more  TON 2008»
14 years 9 months ago
Fixed point analysis of single cell IEEE 802.11e WLANs: uniqueness and multistability
We consider the vector fixed point equations arising out of the analysis of the saturation throughput of a single cell IEEE 802.11e (EDCA) wireless local area network with nodes th...
Venkatesh Ramaiyan, Anurag Kumar, Eitan Altman
CONCURRENCY
2000
123views more  CONCURRENCY 2000»
14 years 9 months ago
A mobile agent based push methodology for global parallel computing
The 1990s are seeing the explosive growth of the Internet and Web-based information sharing and dissemination systems. The Internet is also showing a potential of forming of a sup...
Cheng-Zhong Xu, Brian Wims
COMCOM
1999
164views more  COMCOM 1999»
14 years 9 months ago
Support QoS in IP over ATM
An integrated service internet running real-time and multimedia applications is rapidly becoming a reality. Meanwhile, ATM technology is appearing in the marketplace. It is an imp...
Gung-Chou Lai, Ruay Shiung Chang
TVLSI
2002
119views more  TVLSI 2002»
14 years 9 months ago
Inductive properties of high-performance power distribution grids
Abstract--The design of high integrity, area efficient power distribution grids has become of practical importance as the portion of on-chip interconnect resources dedicated to pow...
Andrey V. Mezhiba, Eby G. Friedman
RAID
2010
Springer
14 years 8 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao