Sciweavers

5234 search results - page 1006 / 1047
» Simulation of Computer Network Attacks
Sort
View
INFOCOM
2002
IEEE
15 years 7 months ago
Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement
IEEE 802.11 Medium Access Control(MAC) is proposed to support asynchronous and time bounded delivery of radio data packets in infrastructure and ad hoc networks. The basis of the I...
Haitao Wu, Yong Peng, Keping Long, Shiduan Cheng, ...
ICS
2010
Tsinghua U.
15 years 7 months ago
Small-ruleset regular expression matching on GPGPUs: quantitative performance analysis and optimization
We explore the intersection between an emerging class of architectures and a prominent workload: GPGPUs (General-Purpose Graphics Processing Units) and regular expression matching...
Jamin Naghmouchi, Daniele Paolo Scarpazza, Mladen ...
ICEIS
2000
IEEE
15 years 6 months ago
Syntax-Directed Translation Schemes for Multi-Agent Systems Conversation Modelling
: In modern organisations the monolithic information systems of the past are being gradually replaced by networked systems, enabling distributed computing often based on multi-agen...
Ana L. N. Fred, Joaquim Filipe
124
Voted
ICMCS
2000
IEEE
134views Multimedia» more  ICMCS 2000»
15 years 6 months ago
TBLB Algorithm for Servicing Real-Time Multimedia Traffic Streams
In this paper, we propose to use a simple packet servicing algorithm suitable for servicing bursty real-time multimedia traffic streams in packet-switched networks. These real-tim...
William K. Wong, Victor C. M. Leung
118
Voted
INFOCOM
2000
IEEE
15 years 6 months ago
Wavelength Assignment in WDM Rings to Minimize SONET ADMs
— We study wavelength assignment for lightpaths over WDM rings to minimize the SONET ADMs used. This problem has attracted much attention recently. However, its computation compl...
Liwu Liu, Xiang-Yang Li, Peng-Jun Wan, Ophir Fried...
« Prev « First page 1006 / 1047 Last » Next »