Sciweavers

474 search results - page 78 / 95
» Experience with Active Congestion Control
Sort
View
ICC
2008
IEEE
164views Communications» more  ICC 2008»
14 years 4 months ago
Detection of Encrypted Tunnels Across Network Boundaries
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
ICRA
2008
IEEE
164views Robotics» more  ICRA 2008»
14 years 4 months ago
Bilateral energy transfer in delayed teleoperation on the time domain
— The time domain passivity framework is attracting interest as a method for granting stability in both telerobotics and haptic contexts; this paper employs this approach in orde...
Jordi Artigas, Carsten Preusche, Gerd Hirzinger, G...
KBSE
2008
IEEE
14 years 4 months ago
Using Simulation to Investigate Requirements Prioritization Strategies
—Agile and traditional plan-based approaches to software system development both agree that prioritizing requirements is an essential activity. They differ in basic strategy - wh...
Daniel Port, Alexy Olkov, Tim Menzies
SASO
2008
IEEE
14 years 4 months ago
Pervasive Self-Learning with Multi-modal Distributed Sensors
Truly ubiquitous computing poses new and significant challenges. A huge number of heterogeneous devices will interact to perform complex distributed tasks. One of the key aspects...
Nicola Bicocchi, Marco Mamei, Andrea Prati, Rita C...
IPPS
2007
IEEE
14 years 4 months ago
An Implementation of Page Allocation Shaping for Energy Efficiency
Main memory in many tera-scale systems requires tens of kilowatts of power. The resulting energy consumption increases system cost and the heat produced reduces reliability. Emerg...
Matthew E. Tolentino, Joseph Turner, Kirk W. Camer...