Sciweavers

4642 search results - page 714 / 929
» Distributed algorithm and reversible network
Sort
View
DCOSS
2010
Springer
15 years 4 months ago
Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges
Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wid...
Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen
CONEXT
2009
ACM
15 years 4 months ago
ThunderDome: discovering upload constraints using decentralized bandwidth tournaments
ThunderDome is a system for collaboratively measuring upload bandwidths in ad-hoc peer-to-peer systems. It works by scheduling bandwidth probes between pairs of hosts, wherein eac...
John R. Douceur, James W. Mickens, Thomas Moscibro...
121
Voted
ADHOC
2006
113views more  ADHOC 2006»
15 years 2 months ago
Positioning using local maps
ct 9 It is often useful to know the positions of nodes in a network. However, in a large network it is impractical to build a 10 single global map. In this paper, we present a new ...
Yi Shang, Wheeler Ruml, Markus P. J. Fromherz
CN
2007
154views more  CN 2007»
15 years 2 months ago
Disjoint multipath routing using colored trees
— Multipath routing (MPR) is an effective strategy to achieve robustness, load balancing, congestion reduction, and increased throughput in computer networks. Disjoint multipath ...
Srinivasan Ramasubramanian, Harish Krishnamoorthy,...
SIGMETRICS
2011
ACM
198views Hardware» more  SIGMETRICS 2011»
14 years 5 months ago
Greening geographical load balancing
Energy expenditure has become a significant fraction of data center operating costs. Recently, “geographical load balancing” has been suggested to reduce energy cost by explo...
Zhenhua Liu, Minghong Lin, Adam Wierman, Steven H....