Sciweavers

6031 search results - page 938 / 1207
» Communicating Transaction Processes
Sort
View
120
Voted
MSWIM
2009
ACM
15 years 11 months ago
How do wireless chains behave?: the impact of MAC interactions
In a Multi-hop Wireless Networks (MHWN), packets are routed between source and destination using a chain of intermediate nodes; chains are a fundamental communication structure in...
Saquib Razak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...
HPDC
2009
IEEE
15 years 11 months ago
Maintaining reference graphs of globally accessible objects in fully decentralized distributed systems
Since the advent of electronic computing, the processors’ clock speed has risen tremendously. Now that energy efficiency requirements have stopped that trend, the number of proc...
Björn Saballus, Thomas Fuhrmann
ICC
2009
IEEE
120views Communications» more  ICC 2009»
15 years 11 months ago
Back-of-the-Envelope Computation of Throughput Distributions in CSMA Wireless Networks
— This paper presents a simple method for computing throughputs of links in a CSMA network. We call our method back-of-the-envelop (BoE) computation, because for many network con...
Soung Chang Liew, Caihong Kai, Jason Leung, Bill W...
ICC
2009
IEEE
106views Communications» more  ICC 2009»
15 years 11 months ago
Pilot Matrix Design for Interim Channel Estimation in Two-Hop MIMO AF Relay Systems
In this paper, we are concerned with a two-hop multi-input-multi-output (MIMO) amplify-andforward (AF) relay system consisting of a source node (SN), a relay node (RN), and a dest...
Jun Ma, Philip V. Orlik, Jinyun Zhang, Ye (Geoffre...
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 11 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic