Sciweavers

450 search results - page 61 / 90
» Robust Topology Control Protocols
Sort
View
76
Voted
ICPP
2009
IEEE
15 years 4 months ago
Performance Limits of Fair-Access in Underwater Sensor Networks
—This paper investigates fundamental performance limits of medium access control (MAC) protocols for particular underwater multi-hop sensor networks under a fair-access criterion...
Yang Xiao, Miao Peng, John H. Gibson, Geoffrey G. ...
CLUSTER
2006
IEEE
15 years 3 months ago
SLA-Based Coordinated Superscheduling Scheme for Computational Grids
The Service Level Agreement (SLA) based grid superscheduling approach promotes coordinated resource sharing. Superscheduling is facilitated between administratively and topologica...
Rajiv Ranjan, Aaron Harwood, Rajkumar Buyya
CONEXT
2008
ACM
14 years 11 months ago
Trellis: a platform for building flexible, fast virtual networks on commodity hardware
We describe Trellis, a platform for hosting virtual networks on shared commodity hardware. Trellis allows each virtual network to define its own topology, control protocols, and f...
Sapan Bhatia, Murtaza Motiwala, Wolfgang Mühl...
91
Voted
WSC
2004
14 years 11 months ago
A BGP Attack Against Traffic Engineering
As the Internet grows, traffic engineering has become a widely-used technique to control the flow of packets. For the inter-domain routing, traffic engineering relies on configura...
Jintae Kim, Steven Y. Ko, David M. Nicol, Xenofont...
CONCUR
2009
Springer
14 years 7 months ago
On Convergence of Concurrent Systems under Regular Interactions
Convergence is often the key liveness property for distributed systems that interact with physical processes. Techniques for proving convergence (asymptotic stability) have been ex...
Pavithra Prabhakar, Sayan Mitra, Mahesh Viswanatha...