Sciweavers

254 search results - page 48 / 51
» Space-Time Network Codes Utilizing Transform-Based Coding
Sort
View
TON
2010
189views more  TON 2010»
14 years 4 months ago
Analysis, Simulation, and Implementation of VCP: A Wireless Profiling
Abstract--Every congestion control protocol operating in wireless networks is potentially faced with two major challenges of performance degradation. These sources are (a) the coup...
Xiaolong Li, Homayoun Yousefi'zadeh
JCSS
2008
81views more  JCSS 2008»
14 years 9 months ago
A simulator for adaptive parallel applications
Dynamically allocating computing nodes to parallel applications is a promising technique for improving the utilization of cluster resources. Detailed simulations can help identify...
Basile Schaeli, Sebastian Gerlach, Roger D. Hersch
NTMS
2009
IEEE
15 years 4 months ago
Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework
—IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one ...
Mahmoud Mostafa, Anas Abou El Kalam, Christian Fra...
NDSS
2007
IEEE
15 years 3 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...
NCA
2007
IEEE
15 years 3 months ago
Towards IQ-Appliances: Quality-awareness in Information Virtualization
Our research addresses two important problems that arise in modern large-scale distributed systems: (1) the necessity to virtualize their data flows by applying actions such as ...
Radhika Niranjan, Ada Gavrilovska, Karsten Schwan,...