Sciweavers

5234 search results - page 742 / 1047
» Simulation of Computer Network Attacks
Sort
View
APNOMS
2006
Springer
15 years 8 months ago
Rate-Based and Gap-Based Available Bandwidth Estimation Techniques in Cross-Traffic Context
Recent years have seen an increasing interest in end-to-end available bandwidth estimation. A number of estimation techniques and tools have been developed during the last few year...
Wayman Tan, Marat Zhanikeev, Yoshiaki Tanaka
APNOMS
2006
Springer
15 years 8 months ago
Improving Handoff Performance by Using Distance-Based Dynamic Hysteresis Value
Abstract. In this study, an adaptive handoff algorithm with a dynamic hysteresis value, based on the distance between the mobile station and the serving base station, is proposed f...
Huamin Zhu, Kyung Sup Kwak
DSN
2004
IEEE
15 years 8 months ago
Data-Aware Multicast
This paper presents a multicast algorithm for peer-topeer dissemination of events in a distributed topic-based publish-subscribe system, where processes publish events of certain ...
Sébastien Baehni, Patrick Th. Eugster, Rach...
DSN
2004
IEEE
15 years 8 months ago
Improving System Dependability with Functional Alternatives
We present the concept of alternative functionality for improving dependability in distributed embedded systems. Alternative functionality is a mechanism that complements traditio...
Charles P. Shelton, Philip Koopman
DAC
1991
ACM
15 years 8 months ago
REX - A VLSI Parasitic Extraction Tool for Electromigration and Signal Analysis
REX is a program that extracts parasitic resistance and capacitance values for nodes in VLSI layouts. REX also performs network serial and parallel simplifications. Two types of n...
Jerry P. Hwang