Sciweavers

8600 search results - page 1279 / 1720
» Measuring with Timed Patterns
Sort
View
SIGMETRICS
2000
ACM
145views Hardware» more  SIGMETRICS 2000»
15 years 4 months ago
The incremental deployability of RTT-based congestion avoidance for high speed TCP Internet connections
Our research focuses on end-to-end congestion avoidance algorithms that use round trip time (RTT) fluctuations as an indicator of the level of network congestion. The algorithms a...
Jim Martin, Arne A. Nilsson, Injong Rhee
CLUSTER
1999
IEEE
15 years 4 months ago
The Network RamDisk: Using remote memory on heterogeneous NOWs
Efficient data storage, a major concern in the modern computer industry, is mostly provided today by the the traditional magnetic disk. Unfortunately the cost of a disk transfer m...
Michail Flouris, Evangelos P. Markatos
WINET
2002
144views more  WINET 2002»
15 years 4 months ago
Exposure in Wireless Sensor Networks: Theory and Practical Solutions
Wireless ad-hoc sensor networks have the potential to provide the missing interface between the physical world and the Internet, thus impacting a large number of users. This conne...
Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Gia...
NETWORK
2007
234views more  NETWORK 2007»
15 years 4 months ago
Surveillance Wireless Sensor Networks: Deployment Quality Analysis
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
TMC
2010
179views more  TMC 2010»
15 years 3 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
« Prev « First page 1279 / 1720 Last » Next »