Sciweavers

16128 search results - page 2921 / 3226
» Distributed network scheduling
Sort
View
151
Voted
JSAC
2007
180views more  JSAC 2007»
15 years 3 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
120
Voted
CCR
2002
112views more  CCR 2002»
15 years 3 months ago
New directions in traffic measurement and accounting
Accurate network traffic measurement is required for accounting, bandwidth provisioning and detecting DoS attacks. These applications see the traffic as a collection of flows they...
Cristian Estan, George Varghese
156
Voted
SIAMCOMP
2000
118views more  SIAMCOMP 2000»
15 years 3 months ago
Constructive, Deterministic Implementation of Shared Memory on Meshes
This paper describes a scheme to implement a shared address space of size m on an n-node mesh, with m polynomial in n, where each mesh node hosts a processor and a memory module. A...
Andrea Pietracaprina, Geppino Pucci, Jop F. Sibeyn
142
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Optimal SINR-based Random Access
— Random access protocols, such as Aloha, are commonly modeled in wireless ad-hoc networks by using the protocol model. However, it is well-known that the protocol model is not a...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong, Robe...
143
Voted
TMA
2010
Springer
150views Management» more  TMA 2010»
15 years 1 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
« Prev « First page 2921 / 3226 Last » Next »