Sciweavers

184 search results - page 31 / 37
» Fairness in Wallets with Observer
Sort
View
MOBIHOC
2002
ACM
14 years 7 months ago
On using the ad-hoc network model in cellular packet data networks
While several approaches have been proposed in literature for improving the performance of wireless packet data networks, a recent class of approaches has focused on improving the...
Hung-Yun Hsieh, Raghupathy Sivakumar
INFOCOM
2003
IEEE
14 years 1 months ago
Flow Level Simulation of Large IP Networks
— The aim of this paper is to simulate the interaction of a large number of TCP controlled flows and UDP flows sharing many routers/links, from the knowledge of the network par...
François Baccelli, Dohy Hong
BIOCOMP
2007
13 years 9 months ago
Prediction of trans-antisense Transcripts in Arabidopsis thaliana
Background: Natural antisense transcripts (NATs) are coding or non-coding RNAs with sequence complementarity to other transcripts (sense transcripts). These RNAs could potentially...
Huan Wang, Nam-Hai Chua, Xiu-Jie Wang
FAST
2007
13 years 9 months ago
Disk Failures in the Real World: What Does an MTTF of 1, 000, 000 Hours Mean to You?
Component failure in large-scale IT installations is becoming an ever larger problem as the number of components in a single cluster approaches a million. In this paper, we presen...
Bianca Schroeder, Garth A. Gibson
LISA
2000
13 years 9 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick