Sciweavers

5623 search results - page 1103 / 1125
» Incremental Mechanism Design
Sort
View
99
Voted
CN
2007
133views more  CN 2007»
15 years 13 days ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
CN
2007
146views more  CN 2007»
15 years 13 days ago
Autonomic control and personalization of a wireless access network
As ICT services are becoming more ubiquitous and mobile and access technologies grow to be more heterogeneous and complex, we are witnessing the increasing importance of two relat...
Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femm...
75
Voted
CN
2007
89views more  CN 2007»
15 years 13 days ago
Determining an appropriate sending rate over an underutilized network path
Determining an appropriate sending rate when beginning data transmission into a network with unknown characteristics is a fundamental issue in best-effort networks. Traditionally,...
Pasi Sarolahti, Mark Allman, Sally Floyd
75
Voted
CN
2007
100views more  CN 2007»
15 years 13 days ago
A simple FIFO-based scheme for differentiated loss guarantees
— Today’s Internet carries an ever broadening range of application traffic with different requirements. This has stressed its original, one-class, best-effort model, and has b...
Yaqing Huang, Roch Guérin
130
Voted
COMCOM
2007
149views more  COMCOM 2007»
15 years 13 days ago
Cache invalidation strategies for internet-based mobile ad hoc networks
Internet-based mobile ad hoc network (IMANET) combines a mobile ad hoc network (MANET) and the Internet to provide universal information accessibility. Although caching frequently...
Sunho Lim, Wang-Chien Lee, Guohong Cao, Chita R. D...
« Prev « First page 1103 / 1125 Last » Next »