Sciweavers

4305 search results - page 720 / 861
» Analysing Protocol Implementations
Sort
View
CDC
2008
IEEE
180views Control Systems» more  CDC 2008»
15 years 10 months ago
Opacity-enforcing supervisory strategies for secure discrete event systems
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speci...
Anooshiravan Saboori, Christoforos N. Hadjicostis
COMSWARE
2008
IEEE
15 years 10 months ago
On TCP-aware uplink scheduling in IEEE 802.16 networks
Abstract—In this paper we propose two polling based scheduling schemes for applications based on TCP in a multipointto-point IEEE 802.16 network. The first scheme uses TCP conge...
Hemant Kumar Rath, Abhay Karandikar
DSN
2008
IEEE
15 years 10 months ago
Hot-spot prediction and alleviation in distributed stream processing applications
Many emerging distributed applications require the realtime processing of large amounts of data that are being updated continuously. Distributed stream processing systems offer a ...
Thomas Repantis, Vana Kalogeraki
DSRT
2008
IEEE
15 years 10 months ago
Design of Application-Specific Incentives in P2P Networks
A rational P2P node may decide not to provide a particular resource or to provide it with degraded quality. If nodes are very likely to behave this way, or if the failure of an P2...
Andrew Roczniak, Abdulmotaleb El-Saddik, Ross Kouh...
ICC
2008
IEEE
150views Communications» more  ICC 2008»
15 years 10 months ago
Adaptive Modulation-Based TCP-Aware Uplink Scheduling in IEEE 802.16 Networks
— In this paper we propose polling based uplink scheduling schemes for TCP based applications in a multipointto-point fixed broadband IEEE 802.16 network. Our schemes adapt the ...
Hemant Kumar Rath, Abhay Karandikar, Vishal Sharma