Results 21 to 30 of about 5,356,527 (332)

Delay Optimization in Bandwidth-Sharing Networks [PDF]

open access: yes2006 40th Annual Conference on Information Sciences and Systems, 2006
Bandwidth-sharing networks as considered by Massoulie & Roberts provide a natural modeling framework for describing the dynamic flow-level interaction among elastic data transfers. Although valuable stability results have been obtained, crucial performance metrics such as flow-level delays and throughputs in these models have remained intractable ...
Verloop, I.M.   +2 more
openaire   +3 more sources

Bandwidth-Optimal Random Shuffling for GPUs [PDF]

open access: yesACM Transactions on Parallel Computing, 2022
Linear-time algorithms that are traditionally used to shuffle data on CPUs, such as the method of Fisher-Yates, are not well suited to implementation on GPUs due to inherent sequential dependencies, and existing parallel shuffling algorithms are unsuitable for GPU architectures because they incur a large number of read/write operations to high latency ...
Rory Mitchell   +3 more
openaire   +2 more sources

Optimizing bandwidth

open access: yesUbiquity, 2001
An approach to high performance distributed Web brokering.
Geoffrey Fox, Shrideep Pallickara
openaire   +1 more source

Long MDS Codes for Optimal Repair Bandwidth [PDF]

open access: yes, 2012
MDS codes are erasure-correcting codes that can correct the maximum number of erasures given the number of redundancy or parity symbols. If an MDS code has r parities and no more than r erasures occur, then by transmitting all the remaining data in ...
Bruck, Jehoshua   +2 more
core   +3 more sources

Compact neighbor discovery (a bandwidth defense through bandwidth optimization) [PDF]

open access: yesProceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., 2005
We present a stateless defense against the neighbor discovery denial-of-service (ND-DoS) attack in IPv6. The ND-DoS attack consists of remotely flooding a target subnet with bogus packets destined for random interface identifiers; a different one for each malicious packet.
P. Mutaf, C. Castelluccia
openaire   +1 more source

The effect of bandwidth in scale-free network traffic [PDF]

open access: yes, 2006
We model information traffic on scale-free networks by introducing the bandwidth as the delivering ability of links. We focus on the effects of bandwidth on the packet delivering ability of the traffic system to better understand traffic dynamic in real ...
Bollobás B.   +11 more
core   +2 more sources

Bandwidth broker extension for optimal resource management

open access: yesJournal of Telecommunications and Information Technology, 2003
Bandwidth broker (BB), resource manager of differentiated services domain cannot provide per domain behavior (PDB) attribute information to customers and neighboring domains at the time of service level agreement (SLA) negotiation.
Shaleeza Sohail, Sanjay Jha
doaj   +1 more source

A Cost-Effective Algorithm for Selecting Optimal Bandwidth to Clear Malicious Codes

open access: yesIEEE Access, 2020
Malicious code has posed a severe threat to modern society. Delivering antivirus program to networks is an important task of a cybersecurity company. As the bandwidth resource in a company is limited and precious, cybersecurity companies have to make a ...
Jichao Bi   +3 more
doaj   +1 more source

Optimizing Age Penalty in Time-Varying Networks with Markovian and Error-Prone Channel State

open access: yesEntropy, 2021
In this paper, we consider a scenario where the base station (BS) collects time-sensitive data from multiple sensors through time-varying and error-prone channels.
Yuchao Chen   +3 more
doaj   +1 more source

Bandwidth-Optimal Kleptographic Attacks [PDF]

open access: yes, 2001
Cryptographic and physical leakage attacks on devices and systems which implement cryptosystems, is an area of much recent activities. One type of attacks are what is called kleptographic attacks which are mounted against black-box cryptosystems. They are issued by and serve solely the designer/manufacturer giving it unique advantage.
Adam Young, Moti Yung
openaire   +1 more source

Home - About - Disclaimer - Privacy