Sciweavers

1275 search results - page 104 / 255
» Communication Network Analysis of the Enterprise Grid System...
Sort
View
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
14 years 12 months ago
Metric forensics: a multi-level approach for mining volatile graphs
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...
INFOCOM
2010
IEEE
14 years 8 months ago
Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection System
— In multi-hop wireless networks, the mobile nodes usually act as routers to relay packets generated from other nodes. However, selfish nodes do not cooperate but make use of the...
Mohamed Elsalih Mahmoud, Xuemin Shen
INFOCOM
2003
IEEE
15 years 3 months ago
Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks
— Mobile ad hoc networking has been an active research area for several years. How to stimulate cooperation among selfish mobile nodes, however, is not well addressed yet. In th...
Sheng Zhong, Jiang Chen, Yang Richard Yang
GLOBECOM
2007
IEEE
15 years 4 months ago
Channel Interference in IEEE 802.11b Systems
— There are many different channels defined in the IEEE 802.11 standard. However, the performance of WiFi networks still greatly suffers from the interference between users, eve...
Pan Li, Nicola Scalabrino, Yuguang Fang, Enrico Gr...
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Analysis of bittorrent-like protocols for on-demand stored media streaming
This paper develops analytic models that characterize the behavior of on-demand stored media content delivery using BitTorrent-like protocols. The models capture the effects of di...
Nadim Parvez, Carey L. Williamson, Anirban Mahanti...