Sciweavers

1566 search results - page 120 / 314
» Contification Using Dominators
Sort
View
CORR
2010
Springer
183views Education» more  CORR 2010»
14 years 10 months ago
Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks
-- In cluster-based routing protocol (CBRP), two-level hierarchical structure is successfully used to reduce over-flooding in wireless ad hoc networks. As it is vulnerable to a sin...
Alok Ojha, Hongmei Deng, Dharma P. Agrawal, Sugata...
COMCOM
2006
89views more  COMCOM 2006»
14 years 10 months ago
Quantifying the effects of recent protocol improvements to TCP: Impact on Web performance
We assess the state of Internet congestion control and error recovery through a controlled study that considers the integration of standards-track TCP error recovery and both TCP ...
Michele C. Weigle, Kevin Jeffay, F. Donelson Smith
TEC
2008
150views more  TEC 2008»
14 years 9 months ago
AbYSS: Adapting Scatter Search to Multiobjective Optimization
We propose the use of a new algorithm to solve multiobjective optimization problems. Our proposal adapts the well-known scatter search template for single objective optimization to...
Antonio J. Nebro, Francisco Luna, Enrique Alba, Be...
TPDS
2008
117views more  TPDS 2008»
14 years 9 months ago
Energy-Efficient Thermal-Aware Task Scheduling for Homogeneous High-Performance Computing Data Centers: A Cyber-Physical Approac
High Performance Computing data centers have been rapidly growing, both in number and size. Thermal management of data centers can address dominant problems associated with cooling...
Qinghui Tang, Sandeep K. S. Gupta, Georgios Varsam...
CCR
1999
91views more  CCR 1999»
14 years 9 months ago
On the effective evaluation of TCP
Understanding the performance of the Internet's Transmission Control Protocol (TCP) is important because it is the dominant protocol used in the Internet today. Various testi...
Mark Allman, Aaron Falk