Sciweavers

NSDI
2004
14 years 28 days ago
Designing a DHT for Low Latency and High Throughput
Designing a wide-area distributed hash table (DHT) that provides high-throughput and low-latency network storage is a challenge. Existing systems have explored a range of solution...
Frank Dabek, Jinyang Li, Emil Sit, James Robertson...
NSDI
2004
14 years 28 days ago
Path-Based Failure and Evolution Management
We present a new approach to managing failures and evolution in large, complex distributed systems using runtime paths. We use the paths that requests follow as e through the syst...
Mike Y. Chen, Anthony Accardi, Emre Kiciman, David...
NSDI
2004
14 years 28 days ago
Total Recall: System Support for Automated Availability Management
Availability is a storage system property that is both highly desired and yet minimally engineered. While many systems provide mechanisms to improve availability
Ranjita Bhagwan, Kiran Tati, Yu-Chung Cheng, Stefa...
NSDI
2004
14 years 28 days ago
Contract-Based Load Management in Federated Distributed Systems
This paper focuses on load management in looselycoupled federated distributed systems. We present a distributed mechanism for moving load between autonomous participants using bil...
Magdalena Balazinska, Hari Balakrishnan, Michael S...
WICON
2008
14 years 1 months ago
SAMPL: a simple aggregation and message passing layer for sensor networks
In recent years, wireless sensor networking has shown great promise in applications ranging from industrial control, environmental monitoring and inventory tracking. Given the res...
Anthony Rowe, Karthik Lakshmanan, Ragunathan Rajku...
WICON
2008
14 years 1 months ago
Lightweight management of scalable and personalised media in mobile IPTV networks
In the present paper a novel system for scalable and personalised media management and its architecture is presented. The proposed solution is based on the creation of a secure an...
Laura Arnaiz, Lara García, Federico Alvarez...
WICON
2008
14 years 1 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
WICON
2008
14 years 1 months ago
Event-triggered strategies for industrial control over wireless networks
New event-based sampling strategies can support the efficient use of radio resources in wireless control systems. Moti
Maben Rabi, Karl Henrik Johansson
WICON
2008
14 years 1 months ago
Using the EAP framework for fast media independent handover authentication
In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover: namely, re-authentication a...
Antonio Izquierdo, Nada Golmie, Katrin Hoeper, Lid...
WICON
2008
14 years 1 months ago
The impact of link-layer retransmissions on video streaming in wireless mesh networks
Link-layer retransmission is a feature of IEEE 802.11 protocol that aims to increase the reliability of data communications. However, when successive retransmissions fail, retrans...
An Chan, Sung-Ju Lee, Xiaolin Cheng, Sujata Banerj...