Sciweavers

189 search results - page 21 / 38
» Performance Evaluation of QAM-Based BICM: An Analytical Appr...
Sort
View
CN
2007
80views more  CN 2007»
13 years 7 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
CN
2006
60views more  CN 2006»
13 years 7 months ago
On the efficiency of fluid simulation of networks
Performance evaluation of computer networks through traditional packet-level simulation is becoming increasingly difficult as networks grow in size along different dimensions. Due...
Daniel R. Figueiredo, Benyuan Liu, Yang Guo, James...
TKDE
2008
134views more  TKDE 2008»
13 years 7 months ago
Contraflow Transportation Network Reconfiguration for Evacuation Route Planning
Given a transportation network having source nodes with evacuees and destination nodes, we want to find a contraflow network configuration (that is, ideal direction for each edge) ...
Sangho Kim, Shashi Shekhar, Manki Min
ISLPED
2004
ACM
122views Hardware» more  ISLPED 2004»
14 years 28 days ago
Microarchitectural techniques for power gating of execution units
Leakage power is a major concern in current and future microprocessor designs. In this paper, we explore the potential of architectural techniques to reduce leakage through power-...
Zhigang Hu, Alper Buyuktosunoglu, Viji Srinivasan,...
ISCAPDCS
2003
13 years 8 months ago
Efficient Data Allocation for a Cluster of Workstations
The development and use of cluster based computing is increasingly becoming an effective approach for solving high performance computing problems. The trend of moving away from sp...
Ahmed M. Mohamed, Reda A. Ammar, Lester Lipsky