Sciweavers

2436 search results - page 6 / 488
» Evaluating the impacts of network information models on appl...
Sort
View
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 7 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
DSN
2008
IEEE
14 years 2 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
IDMS
2001
Springer
145views Multimedia» more  IDMS 2001»
13 years 12 months ago
A Service Differentiation Scheme for the End-System
A number of research studies show that the operating system has a substantial influence on communication delay in distributed environments. Thus, in order to provide applications w...
Domenico Cotroneo, Massimo Ficco, Giorgio Ventre
SIGMETRICS
2004
ACM
118views Hardware» more  SIGMETRICS 2004»
14 years 29 days ago
A game theoretic approach to provide incentive and service differentiation in P2P networks
Traditional Peer-to-Peer (P2P) networks do not provide service differentiation and incentive for users. Consequently, users can easily access information without contributing any ...
Richard T. B. Ma, Sam C. M. Lee, John C. S. Lui, D...
ICDCS
1997
IEEE
13 years 11 months ago
Effect of Connection Rerouting on Application Performance in Mobile Networks
—The increasing deployment of wireless access technology, along with the emergence of high speed integrated service networks, such as ATM, promises to provide mobile users with u...
Partho Pratim Mishra, Mani B. Srivastava