Sciweavers

IWCMC
2010
ACM
13 years 9 months ago
High performance modified DSR routing protocol for WLAN mesh networks
This work presents a cross-layer modification to the DSR protocol which discovers high throughput paths on multi-hop wireless mesh networks. The modified DSR incorporates a metric...
Mustafa Ramadhan, Mark Davis
IWCMC
2010
ACM
13 years 9 months ago
Dynamic load balancing and throughput optimization in 3GPP LTE networks
Load imbalance that deteriorates the system performance is a severe problem existing in 3GPP LTE networks. To deal with this problem, we propose in this paper a load balancing fra...
Hao Wang, Lianghui Ding, Ping Wu, Zhiwen Pan, Nan ...
EENERGY
2010
13 years 9 months ago
Accounting for the energy consumption of personal computing including portable devices
In light of the increased awareness of global energy consumption, questions are also being asked about the contribution of computing equipment. Though studies have documented the ...
Pavel Somavat, Shraddha Jadhav, Vinod Namboodiri
DIMVA
2010
13 years 9 months ago
KIDS - Keyed Intrusion Detection System
Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to m...
Sasa Mrdovic, Branislava Drazenovic
CONEXT
2010
ACM
13 years 9 months ago
A cost comparison of datacenter network architectures
Lucian Popa 0002, Sylvia Ratnasamy, Gianluca Ianna...
CONEXT
2010
ACM
13 years 9 months ago
Balancing throughput, robustness, and in-order delivery in P2P VoD
Peer-to-peer has emerged in recent years as a promising approach to providing Video-on-Demand streaming. The design space, however, is vast and still not well understood--yet choo...
Bin Fan, David G. Andersen, Michael Kaminsky, Kons...
CONEXT
2010
ACM
13 years 9 months ago
Strengthening forensic investigations of child pornography on P2P networks
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and applicationlevel identifiers i...
Marc Liberatore, Brian Neil Levine, Clay Shields
CONEXT
2010
ACM
13 years 9 months ago
SecondNet: a data center network virtualization architecture with bandwidth guarantees
In this paper, we propose virtual data center (VDC) as the unit of resource allocation for multiple tenants in the cloud. VDCs are more desirable than physical data centers becaus...
Chuanxiong Guo, Guohan Lu, Helen J. Wang, Shuang Y...
CONEXT
2010
ACM
13 years 9 months ago
Optimal content placement for a large-scale VoD system
IPTV service providers offering Video-on-Demandcurrently use servers at each metropolitan office to store all the videos in their library. With the rapid increase in library sizes...
David Applegate, Aaron Archer, Vijay Gopalakrishna...