Sciweavers

1500 search results - page 248 / 300
» The Importance of Data Collection for Modelling Contact Netw...
Sort
View
VEE
2012
ACM
322views Virtualization» more  VEE 2012»
12 years 3 months ago
Modeling virtualized applications using machine learning techniques
With the growing adoption of virtualized datacenters and cloud hosting services, the allocation and sizing of resources such as CPU, memory, and I/O bandwidth for virtual machines...
Sajib Kundu, Raju Rangaswami, Ajay Gulati, Ming Zh...
WICON
2008
13 years 9 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
LCN
2002
IEEE
14 years 17 days ago
Performance Analysis of Token-Based Fast TCP in Systems Supporting Large Windows
Since TCP can only detect congestion after packet losses have already happened, various forms of Fast TCP (FTCP) have been proposed to notify congestion early and avoid packet los...
Fei Peng, Victor C. M. Leung
JSAC
2006
102views more  JSAC 2006»
13 years 7 months ago
A deterministic frequency-domain model for the indoor power line transfer function
The characterization of the transfer function of the power line (PL) channel is a nontrivial task that requires a truly interdisciplinary approach. Until recently, a common attribu...
S. Galli, Thomas C. Banwell
INFOCOM
2007
IEEE
14 years 1 months ago
Understanding VoIP from Backbone Measurements
— VoIP has widely been addressed as the technology that will change the Telecommunication model opening the path for convergence. Still today this revolution is far from being co...
Robert Birke, Marco Mellia, Michael Petracca, Dari...