Sciweavers

529 search results - page 31 / 106
» Source Address Validation: Architecture and Protocol Design
Sort
View
109
Voted
IPPS
1999
IEEE
15 years 6 months ago
A Formal Framework for Specifying and Verifying Time Warp Optimizations
Parallel and distributed systems are representative of large and complex systems that require the application of formal methods. These systems are often unreliable because implemen...
Victoria Chernyakhovsky, Peter Frey, Radharamanan ...
ICMCS
2005
IEEE
136views Multimedia» more  ICMCS 2005»
15 years 7 months ago
Gridmedia: A Multi-Sender Based Peer-to-Peer Multicast System for Video Streaming
We present a novel single source peer-to-peer multicast architecture called GridMedia which mainly consists of 1) multi-sender based overlay multicast protocol (MSOMP) and 2) mult...
Meng Zhang, Yun Tang, Li Zhao, Jian-Guang Luo, Shi...
147
Voted
TMC
2012
13 years 4 months ago
E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks
WiFi interface is known to be a primary energy consumer in mobile devices, and idle listening (IL) is the dominant source of energy consumption in WiFi. Most existing protocols, s...
Xinyu Zhang, Kang G. Shin
DATE
2010
IEEE
154views Hardware» more  DATE 2010»
15 years 2 months ago
Computing robustness of FlexRay schedules to uncertainties in design parameters
Abstract--In the current environment of rapidly changing invehicle requirements and ever-increasing functional content for automotive EE systems, there are several sources of uncer...
Arkadeb Ghosal, Haibo Zeng, Marco Di Natale, Yakov...
118
Voted
ISW
2009
Springer
15 years 8 months ago
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
Abstract. The complexity of modern network architectures and the epidemic diffusion of malware require collaborative approaches for defense. We present a novel distributed system ...
Mirco Marchetti, Michele Messori, Michele Colajann...