Sciweavers

1718 search results - page 128 / 344
» Simulating Network Robustness for Critical Infrastructure Ne...
Sort
View
SIGMOD
2003
ACM
179views Database» more  SIGMOD 2003»
15 years 10 months ago
Energy and rate based MAC protocol for wireless sensor networks
Abstract-- Sensor networks are typically unattended because of their deployment in hazardous, hostile or remote environments. This makes the problem of conserving energy at individ...
Rajgopal Kannan, Ramaraju Kalidindi, S. Sitharama ...
AI
2010
Springer
14 years 5 months ago
Robustness of Classifiers to Changing Environments
Abstract. In this paper, we test some of the most commonly used classifiers to identify which ones are the most robust to changing environments. The environment may change over tim...
Houman Abbasian, Chris Drummond, Nathalie Japkowic...
HOTNETS
2010
14 years 4 months ago
CloudPolice: taking access control out of the network
Cloud computing environments impose new challenges on access control techniques due to multi-tenancy, the growing scale and dynamicity of hosts within the cloud infrastructure, an...
Lucian Popa 0002, Minlan Yu, Steven Y. Ko, Sylvia ...
ICPP
1997
IEEE
15 years 2 months ago
How Much Does Network Contention Affect Distributed Shared Memory Performance?
Most of recent research on distributed shared memory (DSM)systems have focused on either careful design of node controllersor cache coherenceprotocols. Whileevaluating these desig...
Donglai Dai, Dhabaleswar K. Panda
SIGMETRICS
2012
ACM
257views Hardware» more  SIGMETRICS 2012»
13 years 10 days ago
Fair sampling across network flow measurements
Sampling is crucial for controlling resource consumption by internet traffic flow measurements. Routers use Packet Sampled NetFlow [9], and completed flow records are sampled in...
Nick G. Duffield