Sciweavers

4270 search results - page 799 / 854
» A Permutation Approach to Validation
Sort
View
122
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
A QoS-aware AIMD protocol for time-sensitive applications in wired/wireless networks
Abstract— A TCP-friendly Additive Increase and Multiplicative Decrease (AIMD) protocol is proposed to support timesensitive applications in hybrid wired/wireless networks. By ana...
Lin Cai, Xuemin Shen, Jon W. Mark, Jianping Pan
113
Voted
IPPS
2005
IEEE
15 years 9 months ago
A Dependency Chain Clustered Microarchitecture
In this paper we explore a new clustering approach for reducing the complexity of wide issue in-order processors based on EPIC architectures. Complexity effectiveness is achieved ...
Satish Narayanasamy, Hong Wang 0003, Perry H. Wang...
KBSE
2005
IEEE
15 years 9 months ago
An analysis of rule coverage as a criterion in generating minimal test suites for grammar-based software
The term grammar-based software describes software whose input can be specified by a context-free grammar. This grammar may occur explicitly in the software, in the form of an in...
Mark Hennessy, James F. Power
114
Voted
SP
2005
IEEE
105views Security Privacy» more  SP 2005»
15 years 9 months ago
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some senso...
Jonathan M. McCune, Elaine Shi, Adrian Perrig, Mic...
118
Voted
TRIDENTCOM
2005
IEEE
15 years 9 months ago
Divide and Conquer: PC-Based Packet Trace Replay at OC-48 Speeds
Today’s Internet backbone networking devices need to be tested under realistic traffic conditions at transmission rates of OC-48 and above. While commercially available synthet...
Tao Ye, Darryl Veitch, Gianluca Iannaccone, Suprat...