Sciweavers

4998 search results - page 820 / 1000
» The case for intentional networking
Sort
View
ICPADS
2006
IEEE
14 years 3 months ago
Destination-Based HoL Blocking Elimination
Congestion management is likely to become a critical issue in interconnection networks, as increasing power consumption and cost concerns will lead to the use of smaller networks....
T. Nachiondo, Jose Flich, José Duato
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
14 years 3 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
ANCS
2006
ACM
14 years 3 months ago
CAMP: fast and efficient IP lookup architecture
A large body of research literature has focused on improving the performance of longest prefix match IP-lookup. More recently, embedded memory based architectures have been propos...
Sailesh Kumar, Michela Becchi, Patrick Crowley, Jo...
MSWIM
2004
ACM
14 years 2 months ago
On utility-based radio resource management with and without service guarantees
In this paper we discuss utility functions models to study Radio Resource Management. Our goal is to identify the characteristics of the wireless systems which make such theoretic...
Leonardo Badia, Michele Zorzi
GECCO
2004
Springer
123views Optimization» more  GECCO 2004»
14 years 2 months ago
Heuristic Methods for Solving Euclidean Non-uniform Steiner Tree Problems
In this paper, we consider a variation of the Euclidean Steiner Tree Problem in which the space underlying the set of nodes has a specified non-uniform cost structure. This proble...
Ian Frommer, Bruce L. Golden, Guruprasad Pundoor