Sciweavers

9245 search results - page 1819 / 1849
» Virtual
Sort
View
TON
2008
109views more  TON 2008»
13 years 8 months ago
On hierarchical traffic grooming in WDM networks
Abstract--The traffic grooming problem is of high practical importance in emerging wide-area wavelength division multiplexing (WDM) optical networks, yet it is intractable for any ...
Bensong Chen, George N. Rouskas, Rudra Dutta
TON
2008
103views more  TON 2008»
13 years 8 months ago
Fixed point analysis of single cell IEEE 802.11e WLANs: uniqueness and multistability
We consider the vector fixed point equations arising out of the analysis of the saturation throughput of a single cell IEEE 802.11e (EDCA) wireless local area network with nodes th...
Venkatesh Ramaiyan, Anurag Kumar, Eitan Altman
CG
2005
Springer
13 years 8 months ago
An experimental exploration of the relationship between subjective impressions of illumination and physical fidelity
Two experiments were carried out to explore the effect of rendering and interface fidelity on subjective impressions of illumination and perceived presence after exposure to a vir...
Katerina Mania, Andrew Robinson
TPDS
2008
78views more  TPDS 2008»
13 years 8 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...
JIPS
2007
223views more  JIPS 2007»
13 years 8 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
« Prev « First page 1819 / 1849 Last » Next »