Sciweavers

1266 search results - page 27 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
TWC
2010
13 years 3 months ago
Efficient experimental evaluation of a MIMO handset with user influence
The immediate environment of handset antennas, including the casings and the users holding the handsets, has a strong impact on the radio channel in mobile communication. In this p...
Fredrik Harrysson, Jonas Medbo, Andreas F. Molisch...
COLCOM
2009
IEEE
14 years 1 months ago
DiSK: A distributed shared disk cache for HPC environments
Abstract—Data movement within high performance environments can be a large bottleneck to the overall performance of programs. With the addition of continuous storage and usage of...
Brandon Szeliga, Tung Nguyen, Weisong Shi
CGI
2006
IEEE
14 years 2 months ago
Providing Full Awareness to Distributed Virtual Environments Based on Peer-to-Peer Architectures
In recent years, large scale distributed virtual environments (DVEs) have become a major trend in distributed applications, mainly due to the enormous popularity of multiplayer onl...
Pedro Morillo, W. Moncho, Juan M. Orduña, J...
VTC
2008
IEEE
124views Communications» more  VTC 2008»
14 years 2 months ago
LOUVRE: Landmark Overlays for Urban Vehicular Routing Environments
—In this paper, we introduce a routing solution called “Landmark Overlays for Urban Vehicular Routing Environments” (LOUVRE), an approach that efficiently builds a landmark ...
Kevin C. Lee, Michael Le, Jérôme H&au...
PE
2002
Springer
124views Optimization» more  PE 2002»
13 years 8 months ago
Continuous-time hidden Markov models for network performance evaluation
In this paper, we study the use of continuous-time hidden Markov models (CT-HMMs) for network protocol and application performance evaluation. We develop an algorithm to infer the...
Wei Wei, Bing Wang, Donald F. Towsley