Sciweavers

70 search results - page 5 / 14
» Experimental Evaluation of the DECOS Fault-Tolerant Communic...
Sort
View
SOSP
2007
ACM
15 years 6 months ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...
SSD
2007
Springer
155views Database» more  SSD 2007»
15 years 3 months ago
MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries
Abstract. Modern mobile phones and PDAs are equipped with positioning capabilities (e.g., GPS). Users can access public location-based services (e.g., Google Maps) and ask spatial ...
Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos
PIMRC
2010
IEEE
14 years 7 months ago
An interference aware throughput maximizing scheduler for centralized cognitive radio networks
In this paper, we propose an interference aware throughput maximizing scheduler for cognitive radio networks (CRNs) as part of a MAC layer resource allocation framework. In the con...
Didem Gozupek, Fatih Alagöz
ICC
2009
IEEE
127views Communications» more  ICC 2009»
15 years 4 months ago
A Study on Cross-Layer Multi-Constraint Path Computation for IP-Over-Optical Networks
— A powerful path computation element is a must for the next-generation IP-over-Optical networks to support ondemand service provisioning crossing layers. The main purpose of pat...
Xi Yang, Tom Lehman, Kenichi Ogaki, Tomohiro Otani
INFOCOM
2007
IEEE
15 years 3 months ago
Performance Comparison of Detection Schemes for MAC Layer Misbehavior
— This paper revisits the problem of detecting greedy behavior in the IEEE 802.11 MAC protocol by evaluating the performance of two previously proposed schemes: DOMINO and the Se...
Alvaro A. Cárdenas, Svetlana Radosavac, Joh...