Sciweavers

4072 search results - page 451 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
SIGMETRICS
2004
ACM
115views Hardware» more  SIGMETRICS 2004»
15 years 9 months ago
Emulating low-priority transport at the application layer: a background transfer service
Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefet...
Peter B. Key, Laurent Massoulié, Bing Wang
111
Voted
CLUSTER
2004
IEEE
15 years 8 months ago
NIC-based offload of dynamic user-defined modules for Myrinet clusters
Many of the modern networks used to interconnect nodes in cluster-based computing systems provide network interface cards (NICs) that offer programmable processors. Substantial re...
Adam Wagner, Hyun-Wook Jin, Dhabaleswar K. Panda, ...
COMSWARE
2008
IEEE
15 years 11 months ago
On TCP-aware uplink scheduling in IEEE 802.16 networks
Abstract—In this paper we propose two polling based scheduling schemes for applications based on TCP in a multipointto-point IEEE 802.16 network. The first scheme uses TCP conge...
Hemant Kumar Rath, Abhay Karandikar
134
Voted
CORR
2007
Springer
113views Education» more  CORR 2007»
15 years 4 months ago
Network Coding over a Noisy Relay : a Belief Propagation Approach
Abstract— In recent years, network coding has been investigated as a method to obtain improvements in wireless networks. A typical assumption of previous work is that relay nodes...
Sichao Yang, Ralf Koetter
ASUNAM
2011
IEEE
14 years 4 months ago
Locating Central Actors in Co-offending Networks
—A co-offending network is a network of offenders who have committed crimes together. Recently different researches have shown that there is a fairly strong concept of network am...
Mohammad A. Tayebi, Laurens Bakker, Uwe Gläss...