Sciweavers

727 search results - page 37 / 146
» Two thresholds are better than one
Sort
View
CN
2000
114views more  CN 2000»
13 years 7 months ago
Improving goodputs of IP packets under ATM UBR traffic with port-based queueing schemes
ATM networks are widely adopted as backbone networks. TCP/IP are the most popular protocols today and it is quite possible that packets are forwarded by ATM networks. In ATM netwo...
Wei Kuang Lai, Mu-Rung Shiu
IMAGING
2003
13 years 9 months ago
Using Colour to Model Outliers
Computer vision applications are able to model and reconstruct three dimensional scenes from several pictures. In this work, we are interested in the group of algorithm that regis...
David Hasler, Sabine Süsstrunk
JSAC
2008
76views more  JSAC 2008»
13 years 7 months ago
Rate-Based Equilibria in Collision Channels with Fading
We consider a wireless collision channel, shared by a finite number of users who transmit to a common base station. Each user wishes to minimize its average transmission rate (or p...
Ishai Menache, Nahum Shimkin
ICC
2011
IEEE
206views Communications» more  ICC 2011»
12 years 7 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
AMMA
2009
Springer
14 years 2 months ago
Manipulating Scrip Systems: Sybils and Collusion
Abstract. Game-theoretic analyses of distributed and peer-to-peer systems typically use the Nash equilibrium solution concept, but this explicitly excludes the possibility of strat...
Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern