Sciweavers

539 search results - page 103 / 108
» Modeling Network Contention Effects on All-to-All Operations
Sort
View
LCN
2006
IEEE
15 years 3 months ago
Performance Limits and Analysis of Contention-based IEEE 802.11 MAC
— Recent advance in IEEE 802.11 based standard has pushed the wireless bandwidth up to 600Mbps while keeping the same wireless medium access control (MAC) schemes for full backwa...
Shao-Cheng Wang, Ahmed Helmy
BMCBI
2010
183views more  BMCBI 2010»
14 years 9 months ago
SING: Subgraph search In Non-homogeneous Graphs
Background: Finding the subgraphs of a graph database that are isomorphic to a given query graph has practical applications in several fields, from cheminformatics to image unders...
Raffaele Di Natale, Alfredo Ferro, Rosalba Giugno,...
80
Voted
ICNP
2009
IEEE
14 years 7 months ago
End-to-End Versus Hop-by-Hop Soft State Refresh for Multi-hop Signaling Systems
Abstract--To ensure state synchronization of signalling operations, many signaling protocol designs choose to establish "soft" state that expires if it is not refreshed. ...
Xiaoming Fu, Jianhua He
CONEXT
2010
ACM
14 years 7 months ago
NEVERMIND, the problem is already fixed: proactively detecting and troubleshooting customer DSL problems
Traditional DSL troubleshooting solutions are reactive, relying mainly on customers to report problems, and tend to be labor-intensive, time consuming, prone to incorrect resoluti...
Yu Jin, Nick G. Duffield, Alexandre Gerber, Patric...
MOBISYS
2009
ACM
15 years 10 months ago
Longitudinal study of a building-scale RFID ecosystem
Radio Frequency IDentification (RFID) deployments are becoming increasingly popular in both industrial and consumer-oriented settings. To effectively exploit and operate such depl...
Evan Welbourne, Karl Koscher, Emad Soroush, Magdal...