Sciweavers

36 search results - page 7 / 8
» Multicast Transport Protocol Analysis: Self-Similar Sources
Sort
View
INFOCOM
2005
IEEE
14 years 2 months ago
Non-pipelined relay improves throughput performance of wireless ad-hoc networks
—The communication model typically assumed in wireless ad-hoc networks is based on a traditional “pipelined relay” (PR) strategy. In PR, an end-to-end flow has multiple outs...
Aravind Velayutham, Karthikeyan Sundaresan, Raghup...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
SIGCOMM
2009
ACM
14 years 3 months ago
Towards automated performance diagnosis in a large IPTV network
IPTV is increasingly being deployed and offered as a commercial service to residential broadband customers. Compared with traditional ISP networks, an IPTV distribution network (i...
Ajay Anil Mahimkar, Zihui Ge, Aman Shaikh, Jia Wan...
ICWN
2008
13 years 10 months ago
Progressive Content-Sensitive Data Retrieval in Sensor Networks
: Problem statement: For a sensor network comprising autonomous and self-organizing data sources, efficient similarity-based search for semantic-rich resources (such as video data)...
Bo Yang, Mareboyana Manohar, Shaoying Kou
WINET
2010
91views more  WINET 2010»
13 years 7 months ago
Route duration modeling for mobile ad-hoc networks
In this paper, we present a model that estimates the time duration of routes formed by several intermediate nodes in mobile multi-hop ad-hoc networks. First, we analyze a 3-node ro...
Michael Pascoe-Chalke, Javier Gomez, Victor Rangel...