Sciweavers

11217 search results - page 2046 / 2244
» Network Coding for Wireless Networks
Sort
View
DSN
2008
IEEE
15 years 5 months ago
Analyzing the effects of disk-pointer corruption
The long-term availability of data stored in a file system depends on how well it safeguards on-disk pointers used to access the data. Ideally, a system would correct all pointer...
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin ...
82
Voted
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 5 months ago
Video TFRC
— TCP-friendly rate control (TFRC) is a congestion control technique that trade-offs responsiveness to the network conditions for a smoother throughput variation. We take advanta...
Evan Tan, Jing Chen, Sebastien Ardon, Emmanuel Loc...
107
Voted
ICC
2008
IEEE
203views Communications» more  ICC 2008»
15 years 5 months ago
Spectrum Leasing via Distributed Cooperation in Cognitive Radio
Abstract— The concept of cognitive radio (or secondary spectrum access) is currently under investigation as a promising paradigm to achieve efficient use of the frequency resour...
Igor Stanojev, Osvaldo Simeone, Yeheskel Bar-Ness,...
ICDCS
2008
IEEE
15 years 5 months ago
Circumventing Server Bottlenecks: Indirect Large-Scale P2P Data Collection
In most large-scale peer-to-peer (P2P) applications, it is necessary to collect vital statistics data — sometimes referred to as logs — from up to millions of peers. Tradition...
Di Niu, Baochun Li
DSN
2007
IEEE
15 years 5 months ago
Robustness Testing of the Windows DDK
Modern computers interact with many kinds of external devices, which have lead to a state where device drivers (DD) account for a substantial part of the operating system (OS) cod...
Manuel Mendonça, Nuno Neves
« Prev « First page 2046 / 2244 Last » Next »