Sciweavers

900 search results - page 43 / 180
» Controlling Inbound Traffic
Sort
View
CHI
2011
ACM
13 years 23 days ago
Comet and target ghost: techniques for selecting moving targets
Numerous applications such as simulations, air traffic control systems, and video surveillance systems are inherently composed of spatial objects that move in a scene. In many ins...
Khalad Hasan, Tovi Grossman, Pourang Irani
INFOCOM
2000
IEEE
14 years 1 months ago
Egress Admission Control
—Allocating resources for multimedia traffic flows with real-time performance requirements is an important challenge for future packet networks. However, in large-scale networks,...
Coskun Cetinkaya, Edward W. Knightly
CN
2006
124views more  CN 2006»
13 years 9 months ago
Session based access control in geographically replicated Internet services
Performance critical services over Internet often rely on geographically distributed architectures of replicated servers. Content Delivery Networks (CDN) are a typical example whe...
Novella Bartolini
IOR
2008
82views more  IOR 2008»
13 years 9 months ago
Heavy-Traffic Optimality of a Stochastic Network Under Utility-Maximizing Resource Allocation
We study a stochastic network that consists of a set of servers processing multiple classes of jobs. Each class of jobs requires a concurrent occupancy of several servers while be...
Heng-Qing Ye, David D. Yao
DIALM
1999
ACM
127views Algorithms» more  DIALM 1999»
14 years 1 months ago
The performance of query control schemes for the zone routing protocol
—In this paper, we study the performance of route query control mechanisms for the Zone Routing Protocol (ZRP) for ad hoc networks. ZRP proactively maintains routing information ...
Zygmunt J. Haas, Marc R. Pearlman