Sciweavers

3972 search results - page 138 / 795
» Design of the iSCSI Protocol
Sort
View
CORR
2011
Springer
191views Education» more  CORR 2011»
13 years 5 months ago
Using Paxos to Build a Scalable, Consistent, and Highly Available Datastore
Spinnaker is an experimental datastore that is designed to run on a large cluster of commodity servers in a single datacenter. It features key-based range partitioning, 3-way repl...
Jun Rao, Eugene J. Shekita, Sandeep Tata
HOTNETS
2010
13 years 5 months ago
Successive interference cancellation: a back-of-the-envelope perspective
Successive interference cancellation (SIC) is a physical layer capability that allows a receiver to decode packets that arrive simultaneously. While the technique is well known in...
Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury...
IJACT
2010
90views more  IJACT 2010»
13 years 5 months ago
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optima
: We study the interplay of network connectivity and the issues related to the `possibility', `feasibility' and `optimality' for unconditionally reliable message tra...
Arpita Patra, Ashish Choudhury, C. Pandu Rangan, K...
INFOCOM
2012
IEEE
12 years 24 days ago
SpeedBalance: Speed-scaling-aware optimal load balancing for green cellular networks
—This paper considers a component-level deceleration technique in BS operation, called speed-scaling, that is more conservative than entirely shutting down BSs, yet can conserve ...
Kyuho Son, Bhaskar Krishnamachari
INFOCOM
2009
IEEE
14 years 5 months ago
Opportunistic Routing Algebra and its Applications
Abstract—Opportunistic routing (OR) has received much attention as a new routing paradigm due to its efficient utilization of broadcasting and spacial diversity of the wireless ...
Mingming Lu, Jie Wu