Sciweavers

5234 search results - page 789 / 1047
» Simulation of Computer Network Attacks
Sort
View
IPTPS
2005
Springer
15 years 10 months ago
A Statistical Theory of Chord Under Churn
Most earlier studies of DHTs under churn have either depended on simulations as the primary investigation tool, or on establishing bounds for DHTs to function. In this paper, we pr...
Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurel...
QOSIP
2005
Springer
15 years 10 months ago
802.11 MAC Protocol with Selective Error Detection for Speech Transmission
The IEEE 802.11 standard currently does not offer support to exploit the unequal perceptual importance of multimedia bitstreams. All packets affected by channel errors, in fact, ...
Antonio Servetti, Juan Carlos De Martin
QOSIP
2001
Springer
15 years 9 months ago
Quality of Service Issues in Multi-service Wireless Internet Links
—Internet application performance over wireless links is disappointing, due to wireless impairments and their adverse interactions with higher protocol layers. In order to effect...
George Xylomenos, George C. Polyzos
SIGGRAPH
2000
ACM
15 years 9 months ago
Pomegranate: a fully scalable graphics architecture
Pomegranate is a parallel hardware architecture for polygon rendering that provides scalable input bandwidth, triangle rate, pixel rate, texture memory and display bandwidth while...
Matthew Eldridge, Homan Igehy, Pat Hanrahan
DSN
2009
IEEE
15 years 8 months ago
Evaluating the impact of Undetected Disk Errors in RAID systems
Despite the reliability of modern disks, recent studies have made it clear that a new class of faults, Undetected Disk Errors (UDEs) also known as silent data corruption events, b...
Eric Rozier, Wendy Belluomini, Veera Deenadhayalan...