Sciweavers

7544 search results - page 112 / 1509
» Network Forensics Analysis
Sort
View
GLOBECOM
2010
IEEE
15 years 1 months ago
Analysis of Messaging Load in a P2PP Overlay Network under Churn
We analyze the performance of a DHT-based P2P overlay network in resource access and overlay maintenance activities. We use a cross-platform implementation of the protocol called P...
Otso Kassinen, Erkki Harjula, Mika Ylianttila
136
Voted
IMC
2010
ACM
15 years 1 months ago
High speed network traffic analysis with commodity multi-core systems
Multi-core systems are the current dominant trend in computer processors. However, kernel network layers often do not fully exploit multi-core architectures. This is due to issues...
Francesco Fusco, Luca Deri
VTC
2010
IEEE
132views Communications» more  VTC 2010»
15 years 1 months ago
Throughput Analysis of General Network Coding Nodes Based on SW-ARQ Transmission
The steady-state throughput of general network coding node is investigated, when data is transmitted in packets based on the stopand-wait automatic repeat request (SW-ARQ) error-co...
Yang Qin, Lie-Liang Yang
TMC
2011
223views more  TMC 2011»
14 years 10 months ago
Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis
Abstract—Recently, many efforts have been made to develop more efficient Inter-Vehicle Communication (IVC) protocols for ondemand route planning according to observed traffic con...
Christoph Sommer, Reinhard German, Falko Dressler
IGPL
2010
125views more  IGPL 2010»
15 years 1 months ago
A normative multiagent approach to requirements engineering
In this paper we present a new model for the requirements analysis of a system. We offer a conceptual model defined following a visual modeling language, called dependence network...
Serena Villata