Sciweavers

5234 search results - page 790 / 1047
» Simulation of Computer Network Attacks
Sort
View
WCNC
2010
IEEE
15 years 8 months ago
Modelling Angle Spread Autocorrelations and the Impact on Multi-User Diversity Gains
—One way of modelling the wireless channel is in a statistical manner, based on a few parameters describing the characteristics of the environment. In most current wireless chann...
Niklas Jalden, Per Zetterberg, Björn E. Otter...
NSDI
2007
15 years 7 months ago
WiDS Checker: Combating Bugs in Distributed Systems
Despite many efforts, the predominant practice of debugging a distributed system is still printf-based log mining, which is both tedious and error-prone. In this paper, we present...
Xuezheng Liu, Wei Lin, Aimin Pan, Zheng Zhang
MOBIDE
2010
ACM
15 years 4 months ago
A cooperative spatial-aware cache for mobile environments
In many scenarios, particularly in military and emergency response operations, mobile nodes that are in close proximity to each other exhibit a high degree of data affinity. For ex...
Fernando J. Maymi, Manuel Rodriguez-Martinez, Wolf...
ICN
2009
Springer
15 years 2 months ago
Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits
It is essential that a monitoring system is being designed with performance and scalability in mind. But due to the diversity and complexity of both the monitoring and the monitore...
Abdelkader Lahmadi, Laurent Andrey, Olivier Festor
AINA
2010
IEEE
15 years 2 months ago
TCP Testing: How Well Does ns2 Match Reality?
New transport protocols continue to appear as alternatives to the Transmission Control Protocol (TCP). Many of these are are designed to address TCP's inefficiency in operatin...
Martin Bateman, Saleem N. Bhatti