Sciweavers

1522 search results - page 114 / 305
» Use of Devolved Controllers in Data Center Networks
Sort
View
INFOCOM
2008
IEEE
15 years 9 months ago
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems
—In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring (ITM...
Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao
AIMS
2007
Springer
15 years 9 months ago
A Terminology for Control Models at Optical Exchanges
Optical or lambda exchanges have emerged to interconnect networks, providing dynamic switching capabilities on OSI layer 1 and layer 2. So far, the only inter-domain dynamics have ...
Freek Dijkstra, Bas van Oudenaarde, Bert Andree, L...
MOBISYS
2008
ACM
16 years 2 months ago
Symphony: synchronous two-phase rate and power control in 802.11 wlans
Adaptive transmit power control in 802.11 Wireless LANs (WLANs) on a per-link basis helps increase network capacity and improves battery life of Wifi-enabled mobile devices. Howev...
Kishore Ramachandran, Ravi Kokku, Honghai Zhang, M...
USITS
2003
15 years 4 months ago
SkipNet: A Scalable Overlay Network with Practical Locality Properties
: Scalable overlay networks such as Chord, Pastry, and Tapestry have recently emerged as a flexible infrastructure for building large peer-to-peer systems. In practice, two disadv...
Nicholas J. A. Harvey, Michael B. Jones, Stefan Sa...
JAIR
2002
163views more  JAIR 2002»
15 years 2 months ago
Efficient Reinforcement Learning Using Recursive Least-Squares Methods
The recursive least-squares (RLS) algorithm is one of the most well-known algorithms used in adaptive filtering, system identification and adaptive control. Its popularity is main...
Xin Xu, Hangen He, Dewen Hu