Sciweavers

2484 search results - page 272 / 497
» Polymatroids with Network Coding
Sort
View
113
Voted
SIGCOMM
1996
ACM
15 years 7 months ago
ASHs: Application-Specific Handlers for High-Performance Messaging
Application-specific safe message handlers (ASHs) are designed to provide applications with hardware-level network performance. ASHs are user-written code fragments that safely an...
Deborah A. Wallach, Dawson R. Engler, M. Frans Kaa...
130
Voted
WSC
1998
15 years 5 months ago
A Speculation-based Approach for Performance and Dependability Analysis: A Case Study
In this paper, we propose two speculation-based methods for fast and accurate simulation-based performance and dependability analysis of complex systems, incorporating detailed si...
Yiqing Huang, Zbigniew Kalbarczyk, Ravishankar K. ...
120
Voted
RAID
2010
Springer
15 years 2 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
141
Voted
WCNC
2010
IEEE
15 years 1 months ago
Channel Modeling and MIMO Capacity for Outdoor Millimeter Wave Links
Recent work has shown that mesh networks based on short-range outdoor millimeter (mm) wave links in the unlicensed 60 GHz band are a promising approach to providing an easily deplo...
Hong Zhang, Sriram Venkateswaran, Upamanyu Madhow
157
Voted
MOBICOM
2012
ACM
13 years 6 months ago
Distinguishing users with capacitive touch communication
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...