Sciweavers

5234 search results - page 959 / 1047
» Simulation of Computer Network Attacks
Sort
View
NOSSDAV
2010
Springer
15 years 1 months ago
Designing a tit-for-tat based peer-to-peer video-on-demand system
Video-on-demand (VoD) is a next-generation Internet application of increasing interest allowing users to start watching a movie almost instantaneously by downloading the video on-...
Kévin Huguenin, Anne-Marie Kermarrec, Vivek...
IPPS
1998
IEEE
15 years 7 months ago
HIPIQS: A High-Performance Switch Architecture Using Input Queuing
Switch-based interconnects are used in a number of application domains including parallel system interconnects, local area networks, and wide area networks. However, very few swit...
Rajeev Sivaram, Craig B. Stunkel, Dhabaleswar K. P...
BMCBI
2007
102views more  BMCBI 2007»
15 years 3 months ago
qPIPSA: Relating enzymatic kinetic parameters and interaction fields
Background: The simulation of metabolic networks in quantitative systems biology requires the assignment of enzymatic kinetic parameters. Experimentally determined values are ofte...
Razif R. Gabdoulline, Matthias Stein, Rebecca C. W...
MOBIHOC
2006
ACM
16 years 2 months ago
Distributed localization using noisy distance and angle information
Localization is an important and extensively studied problem in ad-hoc wireless sensor networks. Given the connectivity graph of the sensor nodes, along with additional local info...
Amitabh Basu, Jie Gao, Joseph S. B. Mitchell, Giri...
IWCMC
2009
ACM
15 years 9 months ago
Effect of feedback prediction on OFDMA system throughput
In wireless communication systems, adaptive modulation and coding (AMC) is used to improve the downlink (DL) spectral efficiency by exploiting the underlying channel condition. Ho...
Mohammad Abdul Awal, Lila Boukhatem