Sciweavers

721 search results - page 52 / 145
» Exploiting Meta-Level information in a Distributed Schedulin...
Sort
View
INFOCOM
2006
IEEE
14 years 2 months ago
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection
— Countering Distributed Denial of Service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this pa...
Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal...
INFOCOM
2003
IEEE
14 years 2 months ago
User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data Networks
— Channel-aware scheduling strategies, such as the Proportional Fair algorithm for the CDMA 1xEV-DO system, provide an effective mechanism for improving throughput performance in...
Sem C. Borst
ICC
2009
IEEE
140views Communications» more  ICC 2009»
14 years 3 months ago
Joint Scheduling and Relay Selection in One- and Two-Way Relay Networks with Buffering
— In most wireless relay networks, the source and relay nodes transmit successively via fixed time division (FTD) and each relay forwards a packet immediately upon receiving. In...
Lianghui Ding, Meixia Tao, Fan Yang, Wenjun Zhang
ICS
2000
Tsinghua U.
14 years 11 days ago
Hardware-only stream prefetching and dynamic access ordering
Memory system bottlenecks limit performance for many applications, and computations with strided access patterns are among the hardest hit. The streams used in such applications h...
Chengqiang Zhang, Sally A. McKee
ICW
2005
IEEE
143views Communications» more  ICW 2005»
14 years 2 months ago
Distributed Mobility Control for Fault-Tolerant Mobile Networks
Large-scale networks of mobile agents autonomously performing long-term sensing and communication tasks will be foreseeable in the near future. Since nodes in such a system commun...
Jie Lin