Sciweavers

1316 search results - page 224 / 264
» Analytic performance models for bounded queueing systems
Sort
View
JPDC
2007
117views more  JPDC 2007»
14 years 9 months ago
Adversarial exploits of end-systems adaptation dynamics
Internet end-systems employ various adaptation mechanisms that enable them to respond adequately to legitimate requests in overload situations. Today, these mechanisms are incorpo...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
HPCA
2012
IEEE
13 years 5 months ago
SCD: A scalable coherence directory with flexible sharer set encoding
Large-scale CMPs with hundreds of cores require a directory-based protocol to maintain cache coherence. However, previously proposed coherence directories are hard to scale beyond...
Daniel Sanchez, Christos Kozyrakis
INFOCOM
2006
IEEE
15 years 3 months ago
Intelligent Distribution of Intrusion Prevention Services on Programmable Routers
— The recent surge of new viruses and host attacks in the Internet and the tremendous propagation speed of selfdistributing attacks has made network security a pressing issue. To...
Andreas Hess, Hans-Florian Geerdes, Roland Wess&au...
TMC
2008
138views more  TMC 2008»
14 years 9 months ago
Airtime Fairness for IEEE 802.11 Multirate Networks
Under a multirate network scenario, the IEEE 802.11 DCF MAC fails to provide airtime fairness for all competing stations since the protocol is designed for ensuring max-min through...
Tarun Joshi, Anindo Mukherjee, Younghwan Yoo, Dhar...
MOBICOM
2012
ACM
13 years 9 days ago
Temporal reachability graphs
While a natural fit for modeling and understanding mobile networks, time-varying graphs remain poorly understood. Indeed, many of the usual concepts of static graphs have no obvi...
John Whitbeck, Marcelo Dias de Amorim, Vania Conan...