Sciweavers

1750 search results - page 340 / 350
» Research challenges of autonomic computing
Sort
View
WS
2006
ACM
14 years 1 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
SIGMETRICS
2005
ACM
197views Hardware» more  SIGMETRICS 2005»
14 years 1 months ago
On the performance characteristics of WLANs: revisited
Wide-spread deployment of infrastructure WLANs has made Wi-Fi an integral part of today’s Internet access technology. Despite its crucial role in affecting end-to-end performan...
Sunwoong Choi, Kihong Park, Chong-kwon Kim
ISPA
2005
Springer
14 years 1 months ago
FairOM: Enforcing Proportional Contributions Among Peers in Internet-Scale Distributed Systems
Abstract. The viability of overlay multicasting has been established by prev ious research. However, in order to apply overlay multicast to Internet -scale distributed systems, suc...
Yijun Lu, Hong Jiang, Dan Feng
ACMDIS
2004
ACM
14 years 1 months ago
Unpacking critical parameters for interface design: evaluating notification systems with the IRC framework
We elaborate a proposal for capturing, extending, and reusing design knowledge gleaned through usability testing. The proposal is specifically targeted to address interface design...
Christa M. Chewar, D. Scott McCrickard, Alistair G...
SIGCOMM
2004
ACM
14 years 1 months ago
Sizing router buffers
All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algor...
Guido Appenzeller, Isaac Keslassy, Nick McKeown