Sciweavers

398 search results - page 71 / 80
» On Performance of Parallel iSCSI Protocol for Networked Stor...
Sort
View
130
Voted
IMC
2007
ACM
15 years 5 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
151
Voted
ASPLOS
2006
ACM
15 years 7 months ago
Integrated network interfaces for high-bandwidth TCP/IP
This paper proposes new network interface controller (NIC) designs that take advantage of integration with the host CPU to provide increased flexibility for operating system kerne...
Nathan L. Binkert, Ali G. Saidi, Steven K. Reinhar...
127
Voted
ESCIENCE
2005
IEEE
15 years 9 months ago
Iteration Aware Prefetching for Remote Data Access
1 Although processing speed, storage capacity and network bandwidth are steadily increasing, network latency remains a bottleneck for scientists accessing large remote data sets. T...
Philip J. Rhodes, Sridhar Ramakrishnan
127
Voted
MIDDLEWARE
2007
Springer
15 years 9 months ago
A piggybacking approach to reduce overhead in sensor network gossiping
Many wireless sensor network protocols are employing gossipbased message dissemination, where nodes probabilistically forward messages, to reduce message overhead. We are concerne...
Ercan Ucan, Nathanael Thompson, Indranil Gupta
144
Voted
IPSN
2003
Springer
15 years 8 months ago
Acoustic Target Tracking Using Tiny Wireless Sensor Devices
With the advancement of MEMS technologies, wireless networks consist of tiny sensor devices hold the promise of revolutionizing sensing in a wide range of application domains becau...
Qixin Wang, Wei-Peng Chen, Rong Zheng, Kihwal Lee,...