Sciweavers

5234 search results - page 776 / 1047
» Simulation of Computer Network Attacks
Sort
View
DSN
2007
IEEE
15 years 11 months ago
Greedy Receivers in IEEE 802.11 Hotspots
As wireless hotspot business becomes a tremendous financial success, users of these networks have increasing motives to misbehave in order to obtain more bandwidth at the expense...
Mi Kyung Han, Brian Overstreet, Lili Qiu
ICNP
2007
IEEE
15 years 11 months ago
Scheduled PSM for Minimizing Energy in Wireless LANs
Power conservation is a general concern for mobile computing and communication. In this paper, we investigate the performance of the current 802.11 power saving mechanism (unschedu...
Yong He, Ruixi Yuan, Xiaojun Ma, Jun Li, C. Wang
CCGRID
2006
IEEE
15 years 10 months ago
Fast Freenet: Improving Freenet Performance by Preferential Partition Routing and File Mesh Propagation
The Freenet Peer-to-Peer network is doing a good job in providing anonymity to the users. But the performance of the network in terms of download speed and request hit ratio is no...
Hans-Emil Skogh, Jonas Haeggstrom, Ali Ghodsi, Ras...
GLOBECOM
2006
IEEE
15 years 10 months ago
AR-PIN/PDC: Flexible Advance Reservation of Intradomain and Interdomain Lightpaths
— A collection of Grid computing resources interconnected by an application-configurable network of lightpaths is called a LambdaGrid. It provides data-intensive applications wit...
Eric He, Xi Wang, Venkatram Vishwanath, Jason Leig...
APCSAC
2005
IEEE
15 years 10 months ago
A Fault-Tolerant Routing Strategy for Fibonacci-Class Cubes
Fibonacci Cubes (FCs), together with the enhanced and extended forms, are a family of interconnection topologies formed by diluting links from binary hypercube. While they scale up...
Zhang Xinhua, Peter Loh