Sciweavers

2242 search results - page 352 / 449
» Using Simulation in Call Centers
Sort
View
TON
2008
75views more  TON 2008»
15 years 2 months ago
TVA: a DoS-limiting network architecture
We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the TVA architecture which builds on capabilities. With our approach, rather than send ...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
TPDS
2008
75views more  TPDS 2008»
15 years 2 months ago
Performance-Guided Load (Un)balancing under Autocorrelated Flows
Size-based policies have been shown in the literature to effectively balance load and improve performance in cluster environments. Size-based policies assign jobs to servers based...
Qi Zhang, Ningfang Mi, Alma Riska, Evgenia Smirni
JSAC
2007
79views more  JSAC 2007»
15 years 2 months ago
Collaborative decoding in bandwidth-constrained environments
We present a cooperative communication scheme in which a group of receivers can collaborate to decode a message that none of the receivers can individually decode. The receivers a...
Arun Nayagam, John M. Shea, Tan F. Wong
JEI
2002
152views more  JEI 2002»
15 years 2 months ago
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique
The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digi...
Jessica J. Fridrich, Miroslav Goljan, Nasir Memon
MONET
2007
170views more  MONET 2007»
15 years 2 months ago
Coexistence of IEEE 802.11b and Bluetooth: An Integrated Performance Analysis
IEEE 802.11b wireless networks and Bluetooth networks provide complimentary services using the same unlicensed radio frequency band. As the benefits of utilizing these services bec...
Min Song, Sachin Shetty, Deepthi Gopalpet