Sciweavers

5234 search results - page 929 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICN
2005
Springer
15 years 9 months ago
Eliminating the Performance Anomaly of 802.11b
Abstract. In this paper, we propose a mechanism to eliminate the performance anomaly of IEEE 802.11b. Performance anomaly happens when nodes that have different transmission rates...
See-hwan Yoo, Jin-Hee Choi, Jae-Hyun Hwang, Chuck ...
ISNN
2005
Springer
15 years 9 months ago
A Block-Adaptive Subspace Method Using Oblique Projections for Blind Separation of Convolutive Mixtures
This paper presents a block-adaptive subspace algorithm via oblique projection for blind source separation (BSS) problem of convolutive mixtures. In the proposed algorithm, the pro...
Chunyi Peng, Xianda Zhang, Qutang Cai
ISPA
2005
Springer
15 years 9 months ago
Online Adaptive Fault-Tolerant Routing in 2D Torus
In this paper, we propose efficient routing algorithms for 2D torus with possible large number of faulty nodes. There is no presumption on the number and the distribution of faulty...
Yamin Li, Shietung Peng, Wanming Chu
108
Voted
MIDDLEWARE
2005
Springer
15 years 9 months ago
Frugal Event Dissemination in a Mobile Environment
Abstract. This paper describes an event dissemination algorithm that impletopic-based publish/subscribe interaction abstraction in mobile ad-hoc networks (MANETs). Our algorithm is...
Sébastien Baehni, Chirdeep Singh Chhabra, R...
PATMOS
2004
Springer
15 years 8 months ago
Modular Construction and Power Modelling of Dynamic Memory Managers for Embedded Systems
Portableembeddeddevicesmustpresentlyrunmultimediaandwireless network applications with enormous computational performance requirements at a low energy consumption. In these applica...
David Atienza, Stylianos Mamagkakis, Francky Catth...