Sciweavers

275 search results - page 53 / 55
» A five level hierarchy for the management of simulation mode...
Sort
View
ICNP
1998
IEEE
13 years 11 months ago
Distributed Network Flow Control based on Dynamic Competitive Markets
Network applications require a certain level of network performance for their proper operation. These individual guarantees can be provided if su cient amounts of network resource...
Errin W. Fulp, Douglas S. Reeves
RTSS
2007
IEEE
14 years 1 months ago
Energy-Aware Scheduling of Real-Time Tasks in Wireless Networked Embedded Systems
Recent technological advances have opened up several distributed real-time applications involving battery-driven embedded devices with local processing and wireless communication ...
G. Sudha Anil Kumar, G. Manimaran
IPPS
2007
IEEE
14 years 1 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
SIGMETRICS
2000
ACM
177views Hardware» more  SIGMETRICS 2000»
13 years 11 months ago
A case for end system multicast
— The conventional wisdom has been that IP is the natural protocol layer for implementing multicast related functionality. However, more than a decade after its initial proposal,...
Yang-Hua Chu, Sanjay G. Rao, Hui Zhang
MASCOTS
2003
13 years 8 months ago
Using User Interface Event Information in Dynamic Voltage Scaling Algorithms
Increasingly, mobile computers use dynamic voltage scaling (DVS) to reduce CPU voltage and speed and thereby increase battery life. To determine how to change voltage and speed wh...
Jacob R. Lorch, Alan Jay Smith