Sciweavers

1080 search results - page 113 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
SIGMETRICS
2004
ACM
107views Hardware» more  SIGMETRICS 2004»
15 years 3 months ago
On zone-balancing of peer-to-peer networks: analysis of random node join
Balancing peer-to-peer graphs, including zone-size distributions, has recently become an important topic of peer-topeer (P2P) research [1], [2], [6], [19], [31], [36]. To bring an...
Xiaoming Wang, Yueping Zhang, Xiafeng Li, Dmitri L...
DAC
2007
ACM
15 years 1 months ago
Experimental Jitter Analysis in a FlexCAN Based Drive-by-Wire Automotive Application
In this paper, we describe several experiments designed to characterize jitter in an actual automotive application designed using FlexCAN, a CAN based communication architecture. ...
Juan R. Pimentel, Jason Paskvan
ICNS
2009
IEEE
15 years 4 months ago
Analysis and Experimental Evaluation of Data Plane Virtualization with Xen
Combining end-host, server and router virtualization could offer isolated and malleable virtual networks of different types, owners and protocols, all sharing one physical infrast...
Fabienne Anhalt, Pascale Vicat-Blanc Primet
DFT
2003
IEEE
145views VLSI» more  DFT 2003»
15 years 3 months ago
System-Level Analysis of Fault Effects in an Automotive Environment
In the last years, new requirements in terms of vehicle performance increased significantly the amount of on-board electronics, thus raising more concern about safety and fault to...
Fulvio Corno, S. Tosato, P. Gabrielli
JCIT
2010
197views more  JCIT 2010»
14 years 4 months ago
Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies to delivery of voice communications over IP networks such as the Internet or other ...
Alireza Dehestani, Pedram Hajipour