Sciweavers

1389 search results - page 201 / 278
» Predicting and Evaluating Distributed Communication Performa...
Sort
View
INFOCOM
2007
IEEE
15 years 10 months ago
Shape Segmentation and Applications in Sensor Networks
—Many sensor network protocols in the literature implicitly assume that sensor nodes are deployed uniformly inside a simple geometric region. When the real deployment deviates fr...
Xianjin Zhu, Rik Sarkar, Jie Gao
IWCMC
2006
ACM
15 years 10 months ago
Tracers placement for IP traceback against DDoS attacks
This paper explores the tracers deployment problem for IP traceback methods how many and where the tracers should be deployed in the network to be effective for locating the attac...
Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-M...
CLUSTER
2003
IEEE
15 years 9 months ago
Application-Bypass Reduction for Large-Scale Clusters
Process skew is an important factor in the performance of parallel applications, especially in large-scale clusters. Reduction is a common collective operation which, by its natur...
Adam Wagner, Darius Buntinas, Dhabaleswar K. Panda...
VTC
2010
IEEE
157views Communications» more  VTC 2010»
15 years 2 months ago
Cross-Layer Solutions for Cooperative Medium Access Control Protocols
— Recent studies have shown that designing a Medium Access Control (MAC) protocol combined with a cooperative approach may improve the attainable network throughput, despite redu...
Alessandro Crismani, Fulvio Babich, Lajos Hanzo
ICC
2009
IEEE
201views Communications» more  ICC 2009»
15 years 1 months ago
Analyzing Selfish Topology Control in Multi-Radio Multi-Channel Multi-Hop Wireless Networks
Typically, topology control is perceived as a per-node transmit power control process that achieves certain networklevel objectives. We take an alternative approach of controlling ...
Ramakant S. Komali, Allen B. MacKenzie