Sciweavers

7778 search results - page 1243 / 1556
» Designing Controllers for Reachability
Sort
View
ISCC
2006
IEEE
134views Communications» more  ISCC 2006»
15 years 10 months ago
A Proposed Framework for Calibration of Available Bandwidth Estimation Tools
Examining the validity or accuracy of proposed available bandwidth estimation tools remains a challenging problem. A common approach consists of evaluating a newly developed tool ...
Joel Sommers, Paul Barford, Walter Willinger
ISM
2006
IEEE
76views Multimedia» more  ISM 2006»
15 years 10 months ago
Peer-to-Peer Secure and Private Community Based Multimedia Communications
We have designed and implemented P2PWNC, a fully distributed, open to all, autonomous WLAN roaming scheme that can be used in a community to provide various multimedia communicati...
Pantelis A. Frangoudis, George C. Polyzos
ISSRE
2006
IEEE
15 years 10 months ago
A State Exploration-Based Approach to Testing Java Monitors
A Java monitor is a Java class that defines one or more synchronized methods. Unlike a regular object, a Java monitor object is intended to be accessed by multiple threads simulta...
Yu Lei, Richard H. Carver, David Chenho Kung, Vidu...
MICRO
2006
IEEE
111views Hardware» more  MICRO 2006»
15 years 10 months ago
Memory Prefetching Using Adaptive Stream Detection
We present Adaptive Stream Detection, a simple technique for modulating the aggressiveness of a stream prefetcher to match a workload’s observed spatial locality. We use this co...
Ibrahim Hur, Calvin Lin
NDSS
2006
IEEE
15 years 10 months ago
Induced Churn as Shelter from Routing-Table Poisoning
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving mil...
Tyson Condie, Varun Kacholia, Sriram Sank, Joseph ...
« Prev « First page 1243 / 1556 Last » Next »