Sciweavers

1522 search results - page 191 / 305
» Use of Devolved Controllers in Data Center Networks
Sort
View
MOBICOM
2006
ACM
14 years 3 months ago
A MAC protocol for ad-hoc underwater acoustic sensor networks
A medium access control (MAC) protocol is proposed that is suitable for non-synchronized ad-hoc networks, and in particular for the energy-constrained underwater acoustic networks...
Borja Peleato, Milica Stojanovic
JCC
2007
121views more  JCC 2007»
13 years 9 months ago
Speeding up parallel GROMACS on high-latency networks
: We investigate the parallel scaling of the GROMACS molecular dynamics code on Ethernet Beowulf clusters and what prerequisites are necessary for decent scaling even on such clust...
Carsten Kutzner, David van der Spoel, Martin Fechn...
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 3 months ago
Quantifying the Interference Gray Zone in Wireless Networks: A Measurement Study
—In wireless networks where communications are made over a shared medium, interference and collisions are the primary causes of packet drops. In multi-hop networks such as wirele...
Wonho Kim, Jeongkeun Lee, Taekyoung Kwon, Sung-Ju ...
JCM
2007
123views more  JCM 2007»
13 years 9 months ago
Experimental Analysis of VoIP over Wireless Local Area Networks
—VoIP is a rapidly growing technology that enables the transport of voice over data networks such as the public Internet. VoIP became a viable alternative to the public switched ...
Abderrahmane Lakas, Mohammed Boulmalf
CCS
2004
ACM
14 years 2 months ago
IP covert timing channels: design and detection
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
Serdar Cabuk, Carla E. Brodley, Clay Shields