Sciweavers

7544 search results - page 1362 / 1509
» Network Forensics Analysis
Sort
View
INFOCOM
1998
IEEE
15 years 8 months ago
Performance Bounds for Dynamic Channel Assignment Schemes Operating under Varying Re-Use Constraints
-We derive bounds for the performance of dynamic channel assignment (DCA) schemeswhich strengthenthe existing Erlang bound. The construction of the bounds is based on a reward para...
Philip A. Whiting, Sem C. Borst
RTSS
1998
IEEE
15 years 8 months ago
Real-Time Scheduling in a Generic Fault-Tolerant Architecture
Previous ultra-dependable real-time computing architectures have been specialised to meet the requirements of a particular application domain. Over the last two years, a consortiu...
Andy J. Wellings, Ljerka Beus-Dukic, David Powell
SIGCOMM
1998
ACM
15 years 8 months ago
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol
Abstract—The sharing of caches among Web proxies is an important technique to reduce Web traffic and alleviate network bottlenecks. Nevertheless it is not widely deployed due to ...
Li Fan, Pei Cao, Jussara M. Almeida, Andrei Z. Bro...
FOCS
1997
IEEE
15 years 8 months ago
Beyond the Flow Decomposition Barrier
We introduce a new approach to the maximum flow problem. This approach is based on assigning arc lengths based on the residual flow value and the residual arc capacities. Our appro...
Andrew V. Goldberg, Satish Rao
IRREGULAR
1997
Springer
15 years 8 months ago
Parallel Shared-Memory State-Space Exploration in Stochastic Modeling
Stochastic modeling forms the basis for analysis in many areas, including biological and economic systems, as well as the performance and reliability modeling of computers and comm...
Susann C. Allmaier, Graham Horton
« Prev « First page 1362 / 1509 Last » Next »