Sciweavers

3972 search results - page 138 / 795
» Design of the iSCSI Protocol
Sort
View
CORR
2011
Springer
191views Education» more  CORR 2011»
14 years 11 months ago
Using Paxos to Build a Scalable, Consistent, and Highly Available Datastore
Spinnaker is an experimental datastore that is designed to run on a large cluster of commodity servers in a single datacenter. It features key-based range partitioning, 3-way repl...
Jun Rao, Eugene J. Shekita, Sandeep Tata
HOTNETS
2010
14 years 11 months ago
Successive interference cancellation: a back-of-the-envelope perspective
Successive interference cancellation (SIC) is a physical layer capability that allows a receiver to decode packets that arrive simultaneously. While the technique is well known in...
Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury...
IJACT
2010
90views more  IJACT 2010»
14 years 11 months ago
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optima
: We study the interplay of network connectivity and the issues related to the `possibility', `feasibility' and `optimality' for unconditionally reliable message tra...
Arpita Patra, Ashish Choudhury, C. Pandu Rangan, K...
INFOCOM
2012
IEEE
13 years 6 months ago
SpeedBalance: Speed-scaling-aware optimal load balancing for green cellular networks
—This paper considers a component-level deceleration technique in BS operation, called speed-scaling, that is more conservative than entirely shutting down BSs, yet can conserve ...
Kyuho Son, Bhaskar Krishnamachari
INFOCOM
2009
IEEE
15 years 11 months ago
Opportunistic Routing Algebra and its Applications
Abstract—Opportunistic routing (OR) has received much attention as a new routing paradigm due to its efficient utilization of broadcasting and spacial diversity of the wireless ...
Mingming Lu, Jie Wu