Sciweavers

2503 search results - page 272 / 501
» Building Computer Network Attacks
Sort
View
MMB
2010
Springer
194views Communications» more  MMB 2010»
15 years 6 months ago
Searching for Tight Performance Bounds in Feed-Forward Networks
Abstract. Computing tight performance bounds in feed-forward networks under general assumptions about arrival and server models has turned out to be a challenging problem. Recently...
Andreas Kiefer, Nicos Gollan, Jens B. Schmitt
SIGCOMM
2010
ACM
15 years 2 months ago
Helios: a hybrid electrical/optical switch architecture for modular data centers
The basic building block of ever larger data centers has shifted from a rack to a modular container with hundreds or even thousands of servers. Delivering scalable bandwidth among...
Nathan Farrington, George Porter, Sivasankar Radha...
CCR
2006
90views more  CCR 2006»
15 years 1 months ago
CRAWDAD: a community resource for archiving wireless data at Dartmouth
Wireless network researchers are seriously starved for data about how real users, applications, and devices use real networks under real network conditions. CRAWDAD, a Community R...
Jihwang Yeo, David Kotz, Tristan Henderson
AVI
2008
15 years 4 months ago
Agent warp engine: formula based shape warping for networked applications
Computer visualization and networking have advanced dramatically over the last few years, partially driven by the exploding video game market. 3D hardware acceleration has reached...
Alexander Repenning, Andri Ioannidou
ADHOCNOW
2007
Springer
15 years 8 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...