Sciweavers

IPCCC
2006
IEEE
14 years 6 months ago
SHARP: a new real-time scheduling algorithm to improve security of parallel applications on heterogeneous clusters
This paper addresses the problem of improving quality of security for real-time parallel applications on heterogeneous clusters. We propose a new security- and heterogeneity-drive...
Tao Xie 0004, Xiao Qin, Mais Nijim
IPCCC
2006
IEEE
14 years 6 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...
IPCCC
2006
IEEE
14 years 6 months ago
The delay distribution of IEEE 802.11e EDCA and 802.11 DCF
A number of works have focused on the mean delay performance of IEEE 802.11 [1]. The main contribution of this paper is that it provides a method to obtain the full distribution o...
Paal E. Engelstad, Olav N. Østerbø
IPCCC
2006
IEEE
14 years 6 months ago
A TCP-aware call admission control scheme for packet-switched wireless networks
Traditional Call Admission Control (CAC) schemes only consider call-level performance and are believed to be sufficient for the circuit-switched wireless network. Since the future...
Xinbing Wang, Do Young Eun, Wenye Wang
IPCCC
2006
IEEE
14 years 6 months ago
Risk reduction based survivable WDM network design
— This paper presents an investment strategy to reduce the risk associated with failures in Wavelength Division Multiplexing (WDM) optical networks. The investment strategy deter...
K. Vajanapoom, David Tipper
IPCCC
2006
IEEE
14 years 6 months ago
OS-aware tuning: improving instruction cache energy efficiency on system workloads
Low power has been considered as an important issue in instruction cache (I-cache) designs. Several studies have shown that the I-cache can be tuned to reduce power. These techniq...
Tao Li, Lizy K. John
IPCCC
2006
IEEE
14 years 6 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood