Sciweavers

529 search results - page 95 / 106
» Source Address Validation: Architecture and Protocol Design
Sort
View
GLOBECOM
2006
IEEE
15 years 5 months ago
Modelling the Impact of User Mobility on the Throughput in Networks of Wireless 802.11 LANs
— The wireless LAN technology 802.11, also called Wi-Fi, offers high speed wireless Internet access for local area environments. WLANs provide much higher data rates than the mob...
Sandjai Bhulai, Robert D. van der Mei, Taoying Yua...
125
Voted
CORR
2010
Springer
160views Education» more  CORR 2010»
14 years 11 months ago
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Abstract: A Mobile Adhoc Network (manet) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination am...
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sud...
90
Voted
ISCA
1995
IEEE
92views Hardware» more  ISCA 1995»
15 years 3 months ago
A Comparison of Full and Partial Predicated Execution Support for ILP Processors
One can e ectively utilize predicated execution to improve branch handling in instruction-level parallel processors. Although the potential bene ts of predicated execution are hig...
Scott A. Mahlke, Richard E. Hank, James E. McCormi...
91
Voted
OTM
2010
Springer
14 years 10 months ago
CoMaP: A Cooperative Overlay-Based Mashup Platform
Recently, mashups have emerged as an important class of Web 2.0 collaborative applications. Mashups can be conceived as personalized Web services which aggregate and manipulate dat...
Osama Al-Haj Hassan, Lakshmish Ramaswamy, John A. ...
IMC
2009
ACM
15 years 6 months ago
Modeling user activities in a large IPTV system
Internet Protocol Television (IPTV) has emerged as a new delivery method for TV. In contrast with native broadcast in traditional cable and satellite TV system, video streams in I...
Tongqing Qiu, Zihui Ge, Seungjoon Lee, Jia Wang, J...