Sciweavers

539 search results - page 93 / 108
» Modeling Network Contention Effects on All-to-All Operations
Sort
View
VRML
1995
ACM
15 years 3 months ago
Internetwork Infrastructure Requirements for Virtual Environments
Virtual environments (VEs) are a broad multidisciplinary research area that includes all aspects of computer science, virtual reality, virtual worlds, teleoperation and telepresenc...
Donald P. Brutzman, Michael R. Macedonia, Michael ...
PDP
2007
IEEE
15 years 6 months ago
RealPeer--A Framework for Simulation-Based Development of Peer-to-Peer Systems
In the process of developing P2P systems simulation has proved to be an essential tool for the evaluation of existing and conceived P2P systems. So far, in practice there has been...
Dieter Hildebrandt, Ludger Bischofs, Wilhelm Hasse...
TRIDENTCOM
2006
IEEE
15 years 5 months ago
The utility of perceptive communication between distant wireless nodes
CSMA-based MAC protocols require wireless nodes to share the transmission medium with other nodes that are within carriersensing (CS) range. Hence, operations that depend on and c...
Kimaya Sanzgiri, Ian D. Chakeres, Elizabeth M. Bel...
CCS
2006
ACM
15 years 3 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
119
Voted
IPPS
2010
IEEE
14 years 9 months ago
On the importance of bandwidth control mechanisms for scheduling on large scale heterogeneous platforms
We study three scheduling problems (file redistribution, independent tasks scheduling and broadcasting) on large scale heterogeneous platforms under the Bounded Multi-port Model. I...
Olivier Beaumont, Hejer Rejeb