Sciweavers

1855 search results - page 346 / 371
» System Consequence
Sort
View
GLOBECOM
2008
IEEE
14 years 4 months ago
A Theory-Driven Distribution Algorithm for Peer-to-Peer Real Time Streaming
—Many distribution algorithms have been proposed up to now for P2P real time streaming. However, due to the lack of basic theoretical results and bounds, common sense and intuiti...
Lorenzo Bracciale, Francesca Lo Piccolo, Dario Luz...
INFOCOM
2008
IEEE
14 years 4 months ago
Firewall Compressor: An Algorithm for Minimizing Firewall Policies
—A firewall is a security guard placed between a private network and the outside Internet that monitors all incoming and outgoing packets. The function of a firewall is to exam...
Alex X. Liu, Eric Torng, Chad R. Meiners
ISPASS
2008
IEEE
14 years 4 months ago
Configurational Workload Characterization
Although the best processor design for executing a specific workload does depend on the characteristics of the workload, it can not be determined without factoring-in the effect o...
Hashem Hashemi Najaf-abadi, Eric Rotenberg
PIMRC
2008
IEEE
14 years 4 months ago
Active Highways (Position Paper)
—Highways are an essential component of our society because they are critical to quality of life and to local and national economies. Under good conditions, highways provide a sa...
Liviu Iftode, Stephen Smaldone, Mario Gerla, James...
ICC
2007
IEEE
139views Communications» more  ICC 2007»
14 years 4 months ago
Impatient Backoff Algorithm: Fairness in a Distributed Ad-Hoc MAC
— Many distributed multiple access (MAC) protocols use an exponential backoff mechanism. In that mechanism, a node picks a random backoff time uniformly in an interval that doubl...
Rajarshi Gupta, Jean C. Walrand