Sciweavers

2162 search results - page 432 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
HICSS
2002
IEEE
148views Biometrics» more  HICSS 2002»
14 years 2 months ago
Barriers to a Wide-Area Trusted Network Early Warning System for Electric Power Disturbances
It is apparent that perturbations of the North American electric power grid follow the patterns and characteristics of Self Organized Critical (SOC) systems. Published studies sho...
Paul W. Oman, Jeff Roberts
ISCC
2002
IEEE
135views Communications» more  ISCC 2002»
14 years 2 months ago
End-to-end versus explicit feedback measurement in 802.11 networks
Higher layer protocols in wireless networks need to dynamically adapt to observed network response. The common approach is that each session employs end-to-end monitoring to estim...
Manthos Kazantzidis, Mario Gerla
SIGECOM
2010
ACM
183views ECommerce» more  SIGECOM 2010»
14 years 2 months ago
The unavailable candidate model: a decision-theoretic view of social choice
One of the fundamental problems in the theory of social choice is aggregating the rankings of a set of agents (or voters) into a consensus ranking. Rank aggregation has found appl...
Tyler Lu, Craig Boutilier
SIGMETRICS
2010
ACM
139views Hardware» more  SIGMETRICS 2010»
14 years 2 months ago
On the flow-level dynamics of a packet-switched network
: The packet is the fundamental unit of transportation in modern communication networks such as the Internet. Physical layer scheduling decisions are made at the level of packets, ...
Ciamac Cyrus Moallemi, Devavrat Shah
IDMS
2001
Springer
116views Multimedia» more  IDMS 2001»
14 years 2 months ago
The Minimal Buffering Requirements of Congestion Controlled Interactive Multimedia Applications
This paper uses analysis and experiments to study the minimal buffering requirements of congestion controlled multimedia applications. Applications in the Internet must use congest...
Kang Li, Charles Krasic, Jonathan Walpole, Molly H...