Sciweavers

922 search results - page 149 / 185
» Controllability and Observability of Second Order Descriptor...
Sort
View
IMC
2006
ACM
14 years 2 months ago
A measurement-based deployment proposal for IP anycast
Despite its growing use in critical infrastructure services, the performance of IP(v4) Anycast and its interaction with IP routing practices is not well understood. In this paper,...
Hitesh Ballani, Paul Francis, Sylvia Ratnasamy
ASPLOS
2008
ACM
13 years 10 months ago
General and efficient locking without blocking
Standard concurrency control mechanisms offer a trade-off: Transactional memory approaches maximize concurrency, but suffer high overheads and cost for retrying in the case of act...
Yannis Smaragdakis, Anthony Kay, Reimer Behrends, ...
CCS
2010
ACM
13 years 8 months ago
Demonstrating cognitive packet network resilience to worm attacks
The need for network stability and reliability has led to the growth of autonomic networks [2] that can provide more stable and more reliable communications via on-line measuremen...
Georgia Sakellari, Erol Gelenbe
CCS
2007
ACM
14 years 2 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
MOBICOM
2004
ACM
14 years 1 months ago
PAVAN: a policy framework for content availabilty in vehicular ad-hoc networks
Advances in wireless communication, storage and processing are realizing next-generation in-vehicle entertainment systems. Even if hundreds of different video or audio titles are...
Shahram Ghandeharizadeh, Shyam Kapadia, Bhaskar Kr...