Sciweavers

1040 search results - page 191 / 208
» Resource Usage Verification
Sort
View
GLOBECOM
2007
IEEE
14 years 4 months ago
Aggregated Bloom Filters for Intrusion Detection and Prevention Hardware
—Bloom Filters (BFs) are fundamental building blocks in various network security applications, where packets from high-speed links are processed using state-of-the-art hardwareba...
N. Sertac Artan, Kaustubh Sinkar, Jalpa Patel, H. ...
ICAC
2007
IEEE
14 years 4 months ago
Adaptive Learning of Metric Correlations for Temperature-Aware Database Provisioning
This paper introduces a transparent self-configuring architecture for automatic scaling with temperature awareness in the database tier of a dynamic content web server. We use a ...
Saeed Ghanbari, Gokul Soundararajan, Jin Chen, Cri...
ICC
2007
IEEE
228views Communications» more  ICC 2007»
14 years 4 months ago
A Non-Cooperative Power Control Game for Secondary Spectrum Sharing
—Limited spectrum resources, inefficient spectrum usage and increasing wireless communication necessitates a paradigm shift from the current fixed spectrum management policy to...
Juncheng Jia, Qian Zhang
INFOCOM
2007
IEEE
14 years 4 months ago
Multicast Scheduling in Cellular Data Networks
— Multicast is an efficient means of transmitting the same content to multiple receivers while minimizing network resource usage. Applications that can benefit from multicast s...
Hyungsuk Won, Han Cai, Do Young Eun, Katherine Guo...
INFOCOM
2007
IEEE
14 years 4 months ago
Achievable Capacity Under the Interference Temperature Model
— The Interference Temperature Model was proposed by the FCC in 2003 as a way to dynamically manage and allocate spectrum resources. It would allow unlicensed radios to sense the...
Thomas C. Clancy