Sciweavers

6393 search results - page 1207 / 1279
» Randomized Algorithms on the Mesh
Sort
View
LCN
2008
IEEE
14 years 3 months ago
WBest: A bandwidth estimation tool for IEEE 802.11 wireless networks
—Bandwidth estimation techniques seek to provide an accurate estimation of available bandwidth such that network applications can adjust their behavior accordingly. However, most...
Mingzhe Li, Mark Claypool, Robert E. Kinicki
ICCCN
2007
IEEE
14 years 3 months ago
A Proactive Test Based Differentiation Technique to Mitigate Low Rate DoS Attacks
— Low rate DoS attacks are emerging threats to the TCP traffic, and the VoIP traffic in the Internet. They are hard to detect as they intelligently send attack traffic inside the...
Amey Shevtekar, Nirwan Ansari
ICDCS
2007
IEEE
14 years 3 months ago
LagOver: Latency Gradated Overlays
We propose a new genre of overlay network for disseminating information from popular but resource constrained sources. We call this communication primitive as Latency Gradated Ove...
Anwitaman Datta, Ion Stoica, Michael J. Franklin
ICPPW
2007
IEEE
14 years 3 months ago
Power Management of Multicore Multiple Voltage Embedded Systems by Task Scheduling
We study the role of task-level scheduling in power management on multicore multiple voltage embedded systems. Multicore on-achip, in particular DSP systems, can greatly improve p...
Gang Qu
CCS
2007
ACM
14 years 3 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
« Prev « First page 1207 / 1279 Last » Next »