Sciweavers

2446 search results - page 330 / 490
» Characterizing the Performance of
Sort
View
INFOCOM
2006
IEEE
15 years 10 months ago
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection
— Countering Distributed Denial of Service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this pa...
Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal...
INFOCOM
2006
IEEE
15 years 10 months ago
Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis
— As the commercial success of the IEEE 802.11 protocol has made wireless infrastructure widely deployed, user organizations are increasingly concerned about the new vulnerabilit...
Yanxia Rong, Sang Kyu Lee, Hyeong-Ah Choi
ITNG
2006
IEEE
15 years 10 months ago
A Decentralized Network Coordinate System for Robust Internet Distance
Network distance, measured as round-trip latency between hosts, is important for the performance of many Internet applications. For example, nearest server selection and proximity...
Li-wei Lehman, Steven Lerman
MICRO
2006
IEEE
155views Hardware» more  MICRO 2006»
15 years 10 months ago
In-Network Cache Coherence
With the trend towards increasing number of processor cores in future chip architectures, scalable directory-based protocols for maintaining cache coherence will be needed. Howeve...
Noel Eisley, Li-Shiuan Peh, Li Shang
167
Voted
RTSS
2006
IEEE
15 years 10 months ago
Modeling and Worst-Case Dimensioning of Cluster-Tree Wireless Sensor Networks
Time-sensitive Wireless Sensor Network (WSN) applications require finite delay bounds in critical situations. This paper provides a methodology for the modeling and the worst-case...
Anis Koubaa, Mário Alves, Eduardo Tovar