Sciweavers

861 search results - page 122 / 173
» Predicting Attack-prone Components
Sort
View
ICC
2007
IEEE
142views Communications» more  ICC 2007»
14 years 4 months ago
Performance Evaluation of Network Systems Accounting for User Behaviors
—Considering user behaviors in the performance evaluation of mobile networks is crucial as traffic generation in such networks is highly dependent on mobility and communication a...
Shigeru Kaneda, Akihito Hiromori, Yoshikazu Akinag...
ICC
2007
IEEE
120views Communications» more  ICC 2007»
14 years 4 months ago
An Event-Detection Estimation Model for Hybrid Adaptive Routing in WSNs
— A fundamental goal of a wireless sensor network (WSN) is to collect and deliver data to external applications. Due to the strong constraints of these networks, routing algorith...
Carlos Mauricio S. Figueiredo, Eduardo Freire Naka...
ICDE
2007
IEEE
125views Database» more  ICDE 2007»
14 years 4 months ago
Improved Buffer Size Adaptation through Cache/Controller Coupling
Database workloads seldom remain static. A system tuned by an expert for the current environment, might not always remain optimal. To deal with this situation, database systems ha...
Christian A. Lang, Bishwaranjan Bhattacharjee, Tim...
ICNS
2007
IEEE
14 years 4 months ago
A Case Study-based Performance Evaluation Framework for CSCF Processes on a Blade-Server
Abstract— The study of protocol behavior and traffic characteristics in a simulated environment is commonly supported by ad-hoc or general purpose simulators (e.g., Opnet, NS-2)...
Preetam Ghosh, Nirmalya Roy, Kalyan Basu, Sajal K....
IPPS
2007
IEEE
14 years 4 months ago
Advanced Shortest Paths Algorithms on a Massively-Multithreaded Architecture
We present a study of multithreaded implementations of Thorup’s algorithm for solving the Single Source Shortest Path (SSSP) problem for undirected graphs. Our implementations l...
Joseph R. Crobak, Jonathan W. Berry, Kamesh Maddur...