Sciweavers

3895 search results - page 729 / 779
» Measuring the effectiveness of ACATS
Sort
View
ACSAC
2007
IEEE
15 years 10 months ago
Routing in the Dark: Pitch Black
In many networks, such as mobile ad-hoc networks and friend-to-friend overlay networks, direct communication between nodes is limited to specific neighbors. Often these networks ...
Nathan S. Evans, Chris GauthierDickey, Christian G...
MOBIQUITOUS
2007
IEEE
15 years 10 months ago
A SpatioTemporal Placement Model for Caching Location Dependent Queries
Client side caching of location dependent queries is an important technique for improving performance of location-based services. Most of the existing research in this area has fo...
Anand Murugappan, Ling Liu
VR
2007
IEEE
179views Virtual Reality» more  VR 2007»
15 years 10 months ago
On the Characterization of Peer-To-Peer Distributed Virtual Environments
Large scale distributed virtual environments (DVEs) have become a major trend in distributed applications, mainly due to the enormous popularity of multi-player online games in th...
Silvia Rueda, Pedro Morillo, Juan M. Orduña...
160
Voted
GLVLSI
2006
IEEE
143views VLSI» more  GLVLSI 2006»
15 years 10 months ago
SACI: statistical static timing analysis of coupled interconnects
Process technology and environment-induced variability of gates and wires in VLSI circuits make timing analyses of such circuits a challenging task. Process variation can have a s...
Hanif Fatemi, Soroush Abbaspour, Massoud Pedram, A...
TRIDENTCOM
2006
IEEE
15 years 10 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff