Sciweavers

408 search results - page 70 / 82
» Network laws
Sort
View
INFOCOM
2007
IEEE
14 years 4 months ago
When TCP Friendliness Becomes Harmful
Abstract— Short TCP flows may suffer significant responsetime performance degradations during network congestion. Unfortunately, this creates an incentive for misbehavior by cl...
Amit Mondal, Aleksandar Kuzmanovic
IWANN
2005
Springer
14 years 3 months ago
CMOL CrossNets as Pattern Classifiers
This presentation has two goals: (i) to review the recently suggested concept of bio-inspired CrossNet architectures for future hybrid CMOL VLSI circuits and (ii) to present new re...
Jung Hoon Lee, Konstantin Likharev
JCO
2006
67views more  JCO 2006»
13 years 9 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
JTAER
2006
143views more  JTAER 2006»
13 years 9 months ago
P2P's Significance for eBusiness: Towards a Research Agenda
Applications running over peer-to-peer (P2P) networks have exploded since the late 1990s. Research is needed into many aspects of P2P. These include architecture, application func...
Roger Clarke
GI
2007
Springer
14 years 4 months ago
Semantic Web Technologies for Power Grid Management
: Utility companies worldwide are facing a multitude of new challenges, which can not be met with the historically grown, monolithic IT systems currently in use. Service oriented a...
Mathias Uslar, Nikolai Dahlem