Sciweavers

1080 search results - page 113 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
SIGMETRICS
2004
ACM
107views Hardware» more  SIGMETRICS 2004»
15 years 9 months ago
On zone-balancing of peer-to-peer networks: analysis of random node join
Balancing peer-to-peer graphs, including zone-size distributions, has recently become an important topic of peer-topeer (P2P) research [1], [2], [6], [19], [31], [36]. To bring an...
Xiaoming Wang, Yueping Zhang, Xiafeng Li, Dmitri L...
DAC
2007
ACM
15 years 8 months ago
Experimental Jitter Analysis in a FlexCAN Based Drive-by-Wire Automotive Application
In this paper, we describe several experiments designed to characterize jitter in an actual automotive application designed using FlexCAN, a CAN based communication architecture. ...
Juan R. Pimentel, Jason Paskvan
ICNS
2009
IEEE
15 years 11 months ago
Analysis and Experimental Evaluation of Data Plane Virtualization with Xen
Combining end-host, server and router virtualization could offer isolated and malleable virtual networks of different types, owners and protocols, all sharing one physical infrast...
Fabienne Anhalt, Pascale Vicat-Blanc Primet
DFT
2003
IEEE
145views VLSI» more  DFT 2003»
15 years 9 months ago
System-Level Analysis of Fault Effects in an Automotive Environment
In the last years, new requirements in terms of vehicle performance increased significantly the amount of on-board electronics, thus raising more concern about safety and fault to...
Fulvio Corno, S. Tosato, P. Gabrielli
JCIT
2010
197views more  JCIT 2010»
14 years 11 months ago
Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies to delivery of voice communications over IP networks such as the Internet or other ...
Alireza Dehestani, Pedram Hajipour