Sciweavers

1072 search results - page 183 / 215
» Service Level Management in Dynamic Value Networks
Sort
View
WWW
2004
ACM
14 years 8 months ago
Accurate, scalable in-network identification of p2p traffic using application signatures
The ability to accurately identify the network traffic associated with different P2P applications is important to a broad range of network operations including application-specifi...
Subhabrata Sen, Oliver Spatscheck, Dongmei Wang
CCGRID
2007
IEEE
14 years 2 months ago
Impact of Adaptive Resource Allocation Requests in Utility Cluster Computing Environments
Maximizing resource provider profit and satisfying user requirements at the same time is a challenging problem in utility computing environments. In this paper, we introduce adap...
Marco Aurélio Stelmar Netto, Rajkumar Buyya
PERCOM
2005
ACM
14 years 7 months ago
Efficient Browsing of Web Search Results on Mobile Devices Based on Block Importance Model
It is expected that more and more people will search the web when they are on the move. Though conventional search engines can be directly visited from mobile devices with web bro...
Xing Xie, Gengxin Miao, Ruihua Song, Ji-Rong Wen, ...
JNCA
2011
137views more  JNCA 2011»
13 years 3 months ago
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks
Built upon a shared wireless medium, wireless mesh network is particularly vulnerable to jamming attacks. The ability to recover from attacks and maintain an acceptable level of s...
Shanshan Jiang, Yuan Xue
ICC
2007
IEEE
165views Communications» more  ICC 2007»
14 years 2 months ago
Throughput and Delay Analysis of Multihop IEEE 802.11 Networks with Capture
In this paper, we present an analytical model for the approximate calculation of the throughput and end-toend delay performance in single hop and multihop IEEE 802.11 networks unde...
Rima Khalaf, Izhak Rubin, Ju-Lan Hsu