Sciweavers

684 search results - page 71 / 137
» Operating a Network Link at 100%
Sort
View
NSPW
2003
ACM
14 years 29 days ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
VTC
2007
IEEE
14 years 2 months ago
Interference Tolerance Signaling Using TDD Busy Tone Concept
Abstract—This paper presents a fully decentralized link adaptation algorithm to manage interference in an ad hoc network operating in TDD mode. The algorithm, called busy tone in...
Patrick Agyapong, Harald Haas, Alexander Tyrrell, ...
MOBILIGHT
2010
13 years 5 months ago
Measuring the Closed-Loop Throughput of 2x2 HSDPA over TX Power and TX Antenna Spacing
Abstract. Mobile network operators demand small base station antennas and high physical layer throughputs. In the downlink, high physical layer throughputs can be achieved by explo...
Sebastian Caban, José Antonio García...
SIGOPSE
1998
ACM
13 years 12 months ago
DROPS: OS support for distributed multimedia applications
The characterising new requirement for distributed multimedia applications is the coexistence of dynamic real-time and non-real-time applications on hosts and networks. While some...
Hermann Härtig, Robert Baumgartl, Martin Borr...
CN
1998
64views more  CN 1998»
13 years 7 months ago
Decentralized Network Connection Preemption Algorithms
Connection preemption provides available and reliable services to high-priority connections when a network is heavily loaded and connection request arrival patterns are unknown, o...
Mohammad Peyravian, Ajay D. Kshemkalyani