Sciweavers

248 search results - page 41 / 50
» Characterizing a spam traffic
Sort
View
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 3 months ago
Buffer Occupancy-Based CAC in Converged IP and Broadcasting Networks
— This paper introduces a buffer occupancy -based admission control mechanism aimed to counter link congestion while fairly sharing the bandwidth in converged IP and broadcasting...
Yassine Hadjadj Aoul, Abdelhamid Nafaa, Ahmed Meha...
VTC
2007
IEEE
134views Communications» more  VTC 2007»
15 years 3 months ago
Effect of Channel-Quality Indicator Delay on HSDPA Performance
This paper evaluates the effect of the channel estimation inaccuracy on the performance of an HSDPA system. This study provides some results from system level simulations that have...
David Martin-Sacristan, Jose F. Monserrat, Javier ...
RTSS
2006
IEEE
15 years 3 months ago
Modeling and Worst-Case Dimensioning of Cluster-Tree Wireless Sensor Networks
Time-sensitive Wireless Sensor Network (WSN) applications require finite delay bounds in critical situations. This paper provides a methodology for the modeling and the worst-case...
Anis Koubaa, Mário Alves, Eduardo Tovar
INFOCOM
2002
IEEE
15 years 2 months ago
Constraint-based path selection methods for on-demand provisioning in WDM networks
Abstract-- We propose a framework for decentralized path selection and on-demand wavelength channel provisioning in WDM networks with routing constraints. Within this framework, th...
Admela Jukan, Gerald Franzl
79
Voted
ICPP
1999
IEEE
15 years 1 months ago
Improving Performance of Load-Store Sequences for Transaction Processing Workloads on Multiprocessors
On-line transaction processing exhibits poor memory behavior in high-end multiprocessor servers because of complex sharing patterns and substantial interaction between the databas...
Jim Nilsson, Fredrik Dahlgren