Sciweavers

173 search results - page 21 / 35
» A study of analyzing network traffic as images in real-time
Sort
View
ICCAD
2001
IEEE
127views Hardware» more  ICCAD 2001»
14 years 5 months ago
What is the Limit of Energy Saving by Dynamic Voltage Scaling?
Dynamic voltage scaling (DVS) is a technique that varies the supply voltage and clock frequency based on the computation load to provide desired performance with the minimal amoun...
Gang Qu
JSAC
2006
140views more  JSAC 2006»
13 years 8 months ago
Backup reprovisioning to remedy the effect of multiple link failures in WDM mesh networks
As networks grow in size and complexity, both the probability and the impact of failures increase. The pre-allocated backup bandwidth, which has been widely investigated in the lit...
Jing Zhang, Keyao Zhu, Biswanath Mukherjee
MONET
2010
125views more  MONET 2010»
13 years 7 months ago
GTPP: General Truncated Pyramid Peer-to-Peer Architecture over Structured DHT Networks
— Hierarchical Distributed Hash Table (DHT) architectures have been among the most interesting research topics since the birth of flat DHT architecture. However, most of the prev...
Zhonghong Ou, Erkki Harjula, Timo Koskela, Mika Yl...
WICON
2008
13 years 10 months ago
Towards optimally exploiting physical layer information in OFDM wireless networks
Wireless communication is inherently vulnerable in nature and packets can be corrupted due to various reasons. The network performance can potentially be improved if one is able t...
Zheng Zeng, P. R. Kumar
CCR
2011
13 years 3 months ago
Misbehaviors in TCP SACK generation
While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors...
Nasif Ekiz, Abuthahir Habeeb Rahman, Paul D. Amer