Sciweavers

5234 search results - page 982 / 1047
» Simulation of Computer Network Attacks
Sort
View
NSDI
2004
15 years 4 months ago
Designing a DHT for Low Latency and High Throughput
Designing a wide-area distributed hash table (DHT) that provides high-throughput and low-latency network storage is a challenge. Existing systems have explored a range of solution...
Frank Dabek, Jinyang Li, Emil Sit, James Robertson...
132
Voted
SIGCOMM
2010
ACM
15 years 2 months ago
Symbiotic routing in future data centers
Building distributed applications for data centers is hard. CamCube explores whether replacing the traditional switchbased network with a directly connected topology makes it easi...
Hussam Abu-Libdeh, Paolo Costa, Antony I. T. Rowst...
JCO
2006
106views more  JCO 2006»
15 years 2 months ago
Reliable Ad Hoc Routing Based on Mobility Prediction
Reliability is a very important issue in Mobile Ad hoc NETworks (MANETs). Shortest paths are usually used to route packets in MANETs. However, a shortest path may fail quickly, bec...
Jian Tang, Guoliang Xue, Weiyi Zhang
133
Voted
WCNC
2010
IEEE
15 years 14 days ago
Channel Modeling and MIMO Capacity for Outdoor Millimeter Wave Links
Recent work has shown that mesh networks based on short-range outdoor millimeter (mm) wave links in the unlicensed 60 GHz band are a promising approach to providing an easily deplo...
Hong Zhang, Sriram Venkateswaran, Upamanyu Madhow
124
Voted
HIPC
2009
Springer
15 years 11 days ago
Distance-aware round-robin mapping for large NUCA caches
In many-core architectures, memory blocks are commonly assigned to the banks of a NUCA cache by following a physical mapping. This mapping assigns blocks to cache banks in a round-...
Alberto Ros, Marcelo Cintra, Manuel E. Acacio, Jos...