Sciweavers

1189 search results - page 202 / 238
» Pipeline Timing Analysis Using a Trace-Driven Simulator
Sort
View
CN
2006
107views more  CN 2006»
15 years 4 months ago
BGP session lifetime modeling in congested networks
The reliable Border Gateway Protocol (BGP) is essential for supporting high quality Internet data communication. In present Internet, due to the lack of differentiation mechanism ...
Li Xiao, Guanghui He, Klara Nahrstedt
JDCTA
2008
110views more  JDCTA 2008»
15 years 4 months ago
Development and Validation of a New Method for Noninvasive Diagnosis of LUTS
Lower urinary tract symptoms (LUTS) affect selfassessed quality of life. The aim of this study is to acquire useful information of LUTS diagnosis thorough uroflow and urophonograp...
Do-Un Jeong, Wan-Young Chung
JSAC
2006
128views more  JSAC 2006»
15 years 4 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum
IAJIT
2007
146views more  IAJIT 2007»
15 years 4 months ago
Adaptive Optimizing of Hello Messages in Wireless Ad-Hoc Networks
: Routing is an important functional aspect in wireless ad-hoc networks that handles discovering and maintaining the paths between nodes within a network. Due to nodes mobility, th...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
TWC
2008
238views more  TWC 2008»
15 years 4 months ago
Downlink resource allocation in multi-carrier systems: frequency-selective vs. equal power allocation
In this paper, a dynamic subcarrier and power allocation problem is considered in the context of asymptotic utility maximization in multi-carrier systems. Using the gradient-based...
Hyang-Won Lee, Song Chong