Sciweavers

3534 search results - page 669 / 707
» On Structural Analysis of Large Networks
Sort
View
CORR
2006
Springer
107views Education» more  CORR 2006»
13 years 8 months ago
Optimal Scheduling of Peer-to-Peer File Dissemination
Peer-to-peer (P2P) overlay networks such as BitTorrent and Avalanche are increasingly used for disseminating potentially large files from a server to many end users via the Intern...
Jochen Mundinger, Richard R. Weber, Gideon Weiss
JCM
2008
118views more  JCM 2008»
13 years 8 months ago
New Receiver Architecture Based on Optical Parallel Interference Cancellation for the Optical CDMA
Optical Code Division Multiple Access (OCDMA) is considered as the strongest candidates for the future high speed optical networks due to the large bandwidth offered by the system,...
N. Elfadel, A. A. Aziz, E. Idriss, A. Mohammed, N....
OIR
2011
401views Neural Networks» more  OIR 2011»
12 years 11 months ago
Using Online Collaborative Tools for Groups to Co-Construct Knowledge
(limit 250 words) Purpose This paper reports and describes the use of MediaWiki and Google Docs at undergraduate level as online collaboration tools for co-constructing knowledge i...
Sam Kai Wah Chu, David M. Kennedy
VLSID
2005
IEEE
285views VLSI» more  VLSID 2005»
14 years 9 months ago
Power Monitors: A Framework for System-Level Power Estimation Using Heterogeneous Power Models
Abstract--Power analysis early in the design cycle is critical for the design of lowpower systems. With the move to system-level specifications and design methodologies, there has ...
Nikhil Bansal, Kanishka Lahiri, Anand Raghunathan,...
RAID
2007
Springer
14 years 2 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang