Sciweavers

352 search results - page 5 / 71
» The design and utility of the ML-RSIM system simulator
Sort
View
INFOCOM
2003
IEEE
14 years 3 months ago
Distributed Network Monitoring with Bounded Link Utilization in IP Networks
— Designing optimal measurement infrastructure is a key step for network management. In this work we address the problem of optimizing a scalable distributed polling system. The ...
Erran L. Li, Marina Thottan, Bin Yao, Sanjoy Paul
IPPS
2008
IEEE
14 years 4 months ago
On utilization of contributory storage in desktop grids
Modern desktop grid environments and shared computing platforms have popularized the use of contributory resources, such as desktop computers, as computing substrates for a variet...
Chreston Miller, Ali Raza Butt, Patrick Butler
TVCG
2010
180views more  TVCG 2010»
13 years 8 months ago
Result-Driven Exploration of Simulation Parameter Spaces for Visual Effects Design
—Graphics artists commonly employ physically-based simulation for the generation of effects such as smoke, explosions, and similar phenomena. The task of finding the correct par...
Stefan Bruckner, Torsten Möller
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
14 years 4 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
PET
2005
Springer
14 years 3 months ago
High-Power Proxies for Enhancing RFID Privacy and Utility
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Ari Juels, Paul F. Syverson, Daniel V. Bailey