Sciweavers

147 search results - page 6 / 30
» Content-Based Computer Simulation of a Networking Course: An...
Sort
View
ACMSE
2006
ACM
14 years 2 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin
DSN
2006
IEEE
14 years 2 months ago
Assessing the Attack Threat due to IRC Channels
This practical experience report presents the results of an investigation into the threat of attacks associated with the chat medium IRC. A combination of simulated users (i.e., b...
Robert Meyer, Michel Cukier
AAAI
2007
13 years 10 months ago
Supporting Feedback and Assessment of Digital Ink Answers to In-Class Exercises
Effective teaching involves treating the presentation of new material and the assessment of students’ mastery of this material as part of a seamless and continuous feedback cycl...
Kimberle Koile, Kevin Chevalier, Michel Rbeiz, Ada...
BROADNETS
2007
IEEE
14 years 2 months ago
Assessing the impact of BitTorrent on DOCSIS networks
Abstract— BitTorrent is a widely deployed peer-to-peer protocol that provides scalable file sharing capabilities. While BitTorrent applications contribute to the demand for high...
James J. Martin, James Westall
TWC
2008
87views more  TWC 2008»
13 years 8 months ago
A token-based scheduling scheme for WLANs supporting voice/data traffic and its performance analysis
Most of the existing medium access control (MAC) protocols for wireless local area networks (WLANs) provide prioritized access by adjusting the contention window sizes or interfram...
Ping Wang, Weihua Zhuang