Sciweavers

2349 search results - page 129 / 470
» Performing time-sensitive network experiments
Sort
View
IWDC
2001
Springer
101views Communications» more  IWDC 2001»
15 years 2 months ago
Resource Stealing in Endpoint Controlled Multi-class Networks
Abstract. Endpoint admission control is a mechanism for achieving scalable services by pushing quality-of-service functionality to end hosts. In particular, hosts probe the network...
Susana Sargento, Rui Valadas, Edward W. Knightly
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
14 years 10 months ago
Bound analysis of closed queueing networks with workload burstiness
Burstiness and temporal dependence in service processes are often found in multi-tier architectures and storage devices and must be captured accurately in capacity planning models...
Giuliano Casale, Ningfang Mi, Evgenia Smirni
JUCS
2007
112views more  JUCS 2007»
14 years 10 months ago
Internet Path Behavior Prediction via Data Mining: Conceptual Framework and Case Study
: In this paper we propose an application of data mining methods in the prediction of the availability and performance of Internet paths. We deploy a general decision-making method...
Leszek Borzemski
PEWASUN
2008
ACM
14 years 11 months ago
Modular network trace analysis
In this paper we present EDAT, a tool designed for the analysis of trace files from network simulations and experiments. The EDAT framework encapsulates analysis steps in extensib...
Wolfgang Kieß, Nadine Chmill, Ulrich Wittels...
TVCG
2008
95views more  TVCG 2008»
14 years 10 months ago
Improving the Readability of Clustered Social Networks using Node Duplication
Exploring communities is an important task in social network analysis. Such communities are currently identified using clustering methods to group actors. This approach often leads...
Nathalie Henry, Anastasia Bezerianos, Jean-Daniel ...