Sciweavers

5234 search results - page 1029 / 1047
» Simulation of Computer Network Attacks
Sort
View
SIGCOMM
2010
ACM
13 years 10 months ago
Predictable 802.11 packet delivery from wireless channel measurements
RSSI is known to be a fickle indicator of whether a wireless link will work, for many reasons. This greatly complicates operation because it requires testing and adaptation to fin...
Daniel Halperin, Wenjun Hu, Anmol Sheth, David Wet...
SIGCOMM
2010
ACM
13 years 10 months ago
NapSAC: design and implementation of a power-proportional web cluster
Energy consumption is a major and costly problem in data centers. A large fraction of this energy goes to powering idle machines that are not doing any useful work. We identify tw...
Andrew Krioukov, Prashanth Mohan, Sara Alspaugh, L...
CN
2008
163views more  CN 2008»
13 years 10 months ago
Loss-resilient window-based congestion control
This paper addresses the problem of fair allocation of bandwidth resources on lossy channels in hybrid heterogeneous networks. It discusses more particularly the ability of window...
Christophe De Vleeschouwer, Pascal Frossard
SIGMETRICS
2008
ACM
142views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Exploiting manufacturing variations for compensating environment-induced clock drift in time synchronization
Time synchronization is an essential service in distributed computing and control systems. It is used to enable tasks such as synchronized data sampling and accurate time-offlight...
Thomas Schmid, Zainul Charbiwala, Jonathan Friedma...
SIGMETRICS
2008
ACM
106views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Fully decentralized emulation of best-effort and processor sharing queues
Control of large distributed cloud-based services is a challenging problem. The Distributed Rate Limiting (DRL) paradigm was recently proposed as a mechanism for tackling this pro...
Rade Stanojevic, Robert Shorten
« Prev « First page 1029 / 1047 Last » Next »