Sciweavers

1840 search results - page 279 / 368
» The Capacity of String-Duplication Systems
Sort
View
SIGCOMM
2009
ACM
14 years 3 months ago
Understanding TCP incast throughput collapse in datacenter networks
TCP Throughput Collapse, also known as Incast, is a pathological behavior of TCP that results in gross under-utilization of link capacity in certain many-to-one communication patt...
Yanpei Chen, Rean Griffith, Junda Liu, Randy H. Ka...
AICCSA
2008
IEEE
283views Hardware» more  AICCSA 2008»
14 years 3 months ago
Performance analysis of identity management in the Session Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) is a standard for managing IP multimedia sessions in the Internet. Identity management in SIP is a crucial security field that deals with id...
Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguy...
FGCN
2008
IEEE
120views Communications» more  FGCN 2008»
14 years 3 months ago
A Study of WiMAX Implementation at University Campuses
The technology of Worldwide Interoperability for Microwave Access (WiMAX) is based on the IEEE 802.16 standard which enables the delivery of last mile wireless broadband access wi...
Chen-Hsiang Yu, Don-Lin Yang, An-Chi Liu
HICSS
2008
IEEE
168views Biometrics» more  HICSS 2008»
14 years 3 months ago
Current Practices in Field Force Automation: Decision Support and Information Management for the Field Force
In the past, field operations have mostly been a stepchild of information and communication technology (ICT) enabled organizational overhaul and process re-design. Recently, incre...
Gwen Trentham, Hans Jochen Scholl
HPCA
2008
IEEE
14 years 3 months ago
Speculative instruction validation for performance-reliability trade-off
With reducing feature size, increasing chip capacity, and increasing clock speed, microprocessors are becoming increasingly susceptible to transient (soft) errors. Redundant multi...
Sumeet Kumar, Aneesh Aggarwal