Sciweavers

4514 search results - page 799 / 903
» Distributed Optimization in Adaptive Networks
Sort
View
ICC
2007
IEEE
124views Communications» more  ICC 2007»
15 years 9 months ago
On the Performance of IEEE 802.16 OFDMA System Under Different Frequency Reuse and Subcarrier Permutation Patterns
— In interference-limited wireless cellular systems, interference avoidance and interference averaging are widely adopted to combat co-channel interference. In different types of...
Huiling Jia, Zhaoyang Zhang, Guanding Yu, Peng Che...
115
Voted
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...
111
Voted
WIOPT
2006
IEEE
15 years 8 months ago
Online association policies in IEEE 802.11 WLANs
Abstract— In this paper, we study the performance of clientAccess Point (AP) association policies in IEEE 802.11 based WLANs. In many scenarios, clients have a choice of APs with...
Gaurav Kasbekar, Joy Kuri, Pavan Nuggehalli
HOTI
2005
IEEE
15 years 8 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
150
Voted
CONEXT
2007
ACM
15 years 6 months ago
Router buffer sizing revisited: the role of the output/input capacity ratio
The issue of router buffer sizing is still open and significant. Previous work either considers open-loop traffic or only analyzes persistent TCP flows. This paper differs in two ...
Ravi S. Prasad, Constantine Dovrolis, Marina Thott...