Sciweavers

3629 search results - page 554 / 726
» A Network Memory Architecture Model and Performance Analysis
Sort
View
ENTCS
2002
145views more  ENTCS 2002»
13 years 9 months ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
TWC
2010
13 years 4 months ago
On the Impact of Channel Estimation Errors on MAC Protocols for MIMO Ad Hoc Networks
In this paper, we evaluate the performance of a Medium Access Control (MAC) protocol for MIMO ad hoc networks under imperfect channel estimation. To this end, we also present an an...
Davide Chiarotto, Paolo Casari, Michele Zorzi
AAAI
2012
11 years 11 months ago
Identifying Bullies with a Computer Game
Current computer involvement in adolescent social networks (youth between the ages of 11 and 17) provides new opportunities to study group dynamics, interactions amongst peers, an...
Juan Fernando Mancilla-Caceres, Wen Pu, Eyal Amir,...
INFOCOM
2006
IEEE
14 years 3 months ago
Intelligent Distribution of Intrusion Prevention Services on Programmable Routers
— The recent surge of new viruses and host attacks in the Internet and the tremendous propagation speed of selfdistributing attacks has made network security a pressing issue. To...
Andreas Hess, Hans-Florian Geerdes, Roland Wess&au...
AHSWN
2010
130views more  AHSWN 2010»
13 years 9 months ago
How Good is Opportunistic Routing? - A Reality Check under Rayleigh Fading Channels
Considerations of realistic channel dynamics motivate the design of a new breed of opportunistic schemes, such as opportunistic transmission, scheduling and routing. Compared to t...
Rong Zheng, Chengzhi Li