Sciweavers

1030 search results - page 44 / 206
» Performance Evaluation of Network Systems Accounting for Use...
Sort
View
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 3 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
MM
2009
ACM
131views Multimedia» more  MM 2009»
14 years 3 months ago
Towards characterizing user interaction with progressively transmitted 3D meshes
We collected traces of how 37 users interacted with 9 progressively streamed and rendered 3D meshes. We analyze the traces and discuss the insights that we learned in relation to ...
Ransi Nilaksha De Silva, Wei Cheng, Dan Liu, Wei T...
ENTCS
2007
98views more  ENTCS 2007»
13 years 8 months ago
Evaluating Complex MAC Protocols for Sensor Networks with APMC
In this paper we present an analysis of a MAC (Medium Access Control) protocol for wireless sensor networks. The purpose of this protocol is to manage wireless media access by con...
Michaël Cadilhac, Thomas Hérault, Rich...
WOSP
1998
ACM
14 years 1 months ago
Poems: end-to-end performance design of large parallel adaptive computational systems
The POEMS project is creating an environment for end-to-end performance modeling of complex parallel and distributed systems, spanning the domains of application software, runti...
Ewa Deelman, Aditya Dube, Adolfy Hoisie, Yong Luo,...
MOBIWAC
2009
ACM
14 years 3 months ago
The sociable traveller: human travelling patterns in social-based mobility
Understanding how humans move is a key factor for the design and evaluation of networking protocols and mobility management solutions in mobile networks. This is particularly true...
Chiara Boldrini, Marco Conti, Andrea Passarella