Sciweavers

2419 search results - page 370 / 484
» Modeling Spatio-temporal Network Computations: A Summary of ...
Sort
View
WIOPT
2005
IEEE
14 years 2 months ago
Performance Measurements of the Saturation Throughput in IEEE 802.11 Access Points
— Performance measurements of IEEE 802.11 access points provide important information for networking research and network management. In this paper, we present an active measurem...
Enrico Pelletta, Hector Velayos
PODC
2011
ACM
13 years 16 hour ago
From bounded to unbounded concurrency objects and back
We consider the power of objects in the unbounded concurrency shared memory model, where there is an infinite set of processes and the number of processes active concurrently may...
Yehuda Afek, Adam Morrison, Guy Wertheim
CCS
2009
ACM
14 years 4 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
DSN
2008
IEEE
14 years 3 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
MSWIM
2005
ACM
14 years 2 months ago
Non-saturation and saturation analysis of IEEE 802.11e EDCA with starvation prediction
An analytical model is proposed to describe the priority schemes of the EDCA mechanism of the IEEE 802.11e standard. EDCA provides class-based differentiated QoS to IEEE 802.11 WL...
Paal Engelstad, Olav N. Østerbø