Sciweavers

452 search results - page 57 / 91
» Is home network application acceptable or not
Sort
View
AAAI
1998
13 years 10 months ago
Bayesian Network Models for Generation of Crisis Management Training Scenarios
We present a noisy-OR Bayesian network model for simulation-based training, and an efficient search-based algorithm for automatic synthesis of plausible training scenarios from co...
Eugene Grois, William H. Hsu, Mikhail Voloshin, Da...
AHSWN
2006
79views more  AHSWN 2006»
13 years 8 months ago
Re-routing Instability in IEEE 802.11 Multi-hop Ad-hoc Networks
TCP throughput instability is a well-known phenomenon in IEEE 802.11 multi-hop ad-hoc networks. However, we find that this problem is not restricted to TCP traffic only, but also ...
Ping Chung Ng, Soung Chang Liew
CSMR
2002
IEEE
14 years 1 months ago
Evolution of a Software Component - Experiences with a Network Editor Component
Even though the benefits of component-based software development are widely accepted, they are easily overestimated. To provide a firmer basis for the general discussion we descri...
Jyrki Akkanen, Attila Kiss, Jukka K. Nurminen
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
14 years 2 months ago
Revisiting the Firewall Abolition Act
Mobility and the New Global Economy are accompanied by requirements for dynamism and flexibility, with respect to e-commerce, inter-organizational activity, and security. The clas...
Philip Robinson, Jochen Haller
OSDI
2002
ACM
14 years 9 months ago
Optimizing the Migration of Virtual Computers
This paper shows how to quickly move the state of a running computer across a network, including the state in its disks, memory, CPU registers, and I/O devices. We call this state...
Constantine P. Sapuntzakis, Ramesh Chandra, Ben Pf...