Sciweavers

184 search results - page 34 / 37
» Network Properties Revealed through Matrix Functions
Sort
View
JSAC
2007
139views more  JSAC 2007»
14 years 9 months ago
Reverse-Engineering MAC: A Non-Cooperative Game Model
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Jang-Won Lee, Ao Tang, Jianwei Huang, Mung Chiang,...
ICIP
2004
IEEE
15 years 11 months ago
A hybrid wavelet framework for modeling vbr video traffic
Traffic models play an important role in network simulation and performance analysis. This paper presents a frame-level hybrid framework for modeling variable bitrate (VBR) video ...
Min Dai, Dmitri Loguinov, Hayder Radha
ENC
2005
IEEE
15 years 3 months ago
SELES: An e-Voting System for Medium Scale Online Elections
— Recent advances in communication networks and cryptographic techniques have made possible to consider online voting systems as a feasible alternative to conventional elections....
Claudia García-Zamora, Francisco Rodr&iacut...
87
Voted
UPP
2004
Springer
15 years 2 months ago
Grassroots Approach to Self-management in Large-Scale Distributed Systems
Abstract. Traditionally, autonomic computing is envisioned as replacing the human factor in the deployment, administration and maintenance of computer systems that are ever more co...
Özalp Babaoglu, Márk Jelasity, Alberto...
80
Voted
TRIDENTCOM
2006
IEEE
15 years 3 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff