Sciweavers

2699 search results - page 407 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
INFOCOM
2000
IEEE
14 years 2 months ago
Power Controlled Multiple Access (PCMA) in Wireless Communication Networks
—We address the issue of power-controlled shared channel access in future wireless networks supporting packetized data traffic, beyond the voice-oriented continuous traffic prima...
Nicholas Bambos, Sunil Kandukuri
CONEXT
2008
ACM
13 years 12 months ago
Trellis: a platform for building flexible, fast virtual networks on commodity hardware
We describe Trellis, a platform for hosting virtual networks on shared commodity hardware. Trellis allows each virtual network to define its own topology, control protocols, and f...
Sapan Bhatia, Murtaza Motiwala, Wolfgang Mühl...
SERP
2003
13 years 11 months ago
Measures for Mobile Users
— Software measures are important to evaluate software properties like complexity, reusability, maintainability, effort required, etc. Collecting such data is difficult because o...
Alberto Sillitti, Andrea Janes, Giancarlo Succi, T...
JNW
2008
133views more  JNW 2008»
13 years 10 months ago
A Route Establishment Scheme for Multi-route Coding in Multihop Cellular Networks
Since the network topology in multihop cellular networks is flexible, multiple routes from a user station to a base station can be established. To reduce packet reception errors of...
Hiraku Okada, Hitoshi Imai, Takaya Yamazato, Masaa...
ICDCS
1997
IEEE
14 years 2 months ago
Load Profiling In Distributed Real-Time Systems
Load balancing is often used to ensure that nodes in a distributed systems are equally loaded. In this paper, we show that for real-time systems, load balancing is not desirable. ...
Azer Bestavros