Sciweavers

1394 search results - page 179 / 279
» On performance limitations of congestion control
Sort
View
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
13 years 1 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
ATAL
2005
Springer
14 years 7 days ago
Automated resource-driven mission phasing techniques for constrained agents
A constrained agent is limited in the actions that it can take at any given time, and a challenging problem is to design policies for such agents to do the best they can despite t...
Jianhui Wu, Edmund H. Durfee
AUTONOMICS
2007
ACM
14 years 2 days ago
Multi-hop broadcast from theory to reality: practical design for ad hoc networks
We propose a complete design for a scope limited, multihop broadcast middleware, which is adapted to the variability of the ad-hoc environment and works in unlimited ad-hoc networ...
Alaeddine El Fawal, Jean-Yves Le Boudec, Kav&eacut...
WMI
2001
112views more  WMI 2001»
13 years 11 months ago
Quality of service and mobility for the wireless internet
Our paper explores the issue of how to provide appropriate quality of service mechanisms closely integrated with flexible mobility management in wireless local area networks. We co...
J. Antonio García-Macías, Franck Rou...
SIGCOMM
2009
ACM
14 years 4 months ago
Building a fast, virtualized data plane with programmable hardware
Network virtualization allows many networks to share the same underlying physical topology; this technology has offered promise both for experimentation and for hosting multiple n...
Muhammad Bilal Anwer, Nick Feamster