Sciweavers

733 search results - page 113 / 147
» Measurements, Analysis, and Modeling of BitTorrent-like Syst...
Sort
View
MSCS
2010
84views more  MSCS 2010»
14 years 10 months ago
Channel abstractions for network security
Abstractions for Network Security† MICH E L E B U G L I E S I, R I C C A R D O F O C A R D I Dipartimento di Informatica, Universit`a Ca’ Foscari, Venice. Received 6 October 20...
Michele Bugliesi, Riccardo Focardi
MSWIM
2005
ACM
15 years 5 months ago
Using statistical design of experiments for analyzing mobile ad hoc networks
The performance of mobile ad hoc networks can be influenced by numerous factors, including protocol design at every layer; parameter settings such as retransmission limits and ti...
Michael W. Totaro, Dmitri D. Perkins
SAC
2004
ACM
15 years 5 months ago
Concatenate feature extraction for robust 3D elliptic object localization
Developing an efficient object localization system for complicated industrial objects is an important, yet difficult robotic task. To tackle this problem, we have developed a syst...
Yuichi Motai, Akio Kosaka
IMC
2006
ACM
15 years 5 months ago
Understanding churn in peer-to-peer networks
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and evaluation. Accurately characterizing churn requir...
Daniel Stutzbach, Reza Rejaie
CASES
2008
ACM
15 years 1 months ago
Multi-granularity sampling for simulating concurrent heterogeneous applications
Detailed or cycle-accurate/bit-accurate (CABA) simulation is a critical phase in the design flow of embedded systems. However, with increasing system complexity, full detailed sim...
Melhem Tawk, Khaled Z. Ibrahim, Smaïl Niar