咨询与建议

限定检索结果

文献类型

  • 53 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 54 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19 篇 工学
    • 17 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 6 篇 信息与通信工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 安全科学与工程
  • 8 篇 理学
    • 6 篇 数学
    • 3 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 3 篇 工商管理

主题

  • 27 篇 computer network...
  • 16 篇 laboratories
  • 14 篇 bandwidth
  • 12 篇 optical fiber ne...
  • 11 篇 wdm networks
  • 11 篇 intelligent netw...
  • 11 篇 protection
  • 10 篇 wavelength divis...
  • 10 篇 telecommunicatio...
  • 7 篇 quality of servi...
  • 6 篇 routing
  • 6 篇 fault tolerance
  • 6 篇 computer archite...
  • 5 篇 peer to peer com...
  • 5 篇 web and internet...
  • 4 篇 application soft...
  • 4 篇 real time system...
  • 4 篇 optical design
  • 4 篇 resource managem...
  • 4 篇 analytical model...

机构

  • 11 篇 dependable compu...
  • 7 篇 dependable compu...
  • 6 篇 dependable compu...
  • 6 篇 dependable compu...
  • 3 篇 dependable compu...
  • 3 篇 dependable compu...
  • 3 篇 dependable compu...
  • 1 篇 dependable compu...
  • 1 篇 dependable compu...
  • 1 篇 department of el...
  • 1 篇 information syst...
  • 1 篇 state key labora...
  • 1 篇 dependable compu...
  • 1 篇 dependable netwo...
  • 1 篇 key laboratory o...
  • 1 篇 real-time comput...
  • 1 篇 dependable compu...
  • 1 篇 the dependable c...
  • 1 篇 dependable compu...
  • 1 篇 network mathemat...

作者

  • 20 篇 a.k. somani
  • 13 篇 g. manimaran
  • 10 篇 somani arun k.
  • 7 篇 manimaran g.
  • 5 篇 a. striegel
  • 4 篇 r. gupta
  • 4 篇 r. srinivasan
  • 3 篇 p. datta
  • 3 篇 b. al-duwairi
  • 3 篇 jing fang
  • 3 篇 m.t. frederick
  • 3 篇 fang jing
  • 2 篇 s. swaminathan
  • 2 篇 sangireddy rama
  • 2 篇 wensheng he
  • 2 篇 kim huesung
  • 2 篇 al-omari r.
  • 2 篇 heng xu
  • 2 篇 srinivasan r.
  • 2 篇 swaminathan s.

语言

  • 54 篇 英文
检索条件"机构=Dependable Computing & Networking Laboratory Dept of Electrical and Computer Engineering"
54 条 记 录,以下是1-10 订阅
排序:
Distributed multi-agent optimization subject to nonidentical constraints and communication delays
Distributed multi-agent optimization subject to nonidentical...
收藏 引用
作者: Lin, Peng Ren, Wei Song, Yongduan School of Electronic and Information Engineering Xi'An Jiaotong University China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering University of California Riverside United States Key Laboratory of Dependable Service Computing Cyber Physical Society Ministry of Education Chongqing University China School of Automation Chongqing University China
In this paper, we study a distributed optimization problem using a subgradient projection algorithm for multi-agent systems subject to nonidentical constraints and communication delays under local communication. Here ... 详细信息
来源: 评论
Efficient protection and grooming architectures for future optical networks
Efficient protection and grooming architectures for future o...
收藏 引用
Network Architectures, Management, and Applications VII
作者: Somani, Arun K. Dependable Computing and Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IA 50011 United States
Today networks are too cumbersome due to the incoherent integration of various technologies developed over time. Convergence of data, voice and video has caused the retro-fitting of a network to support non-native tra... 详细信息
来源: 评论
Efficient protection and grooming architectures for future optical networks
Efficient protection and grooming architectures for future o...
收藏 引用
Asia Communications and Photonics Conference and Exhibition (ACP)
作者: Arun K. Somani Dependable Computing & Networking Laboratory Department of Electrical & Computer Engineering Iowa State University Ames IA USA
Today networks are too cumbersome due to the incoherent integration of various technologies developed over time. Convergence of data, voice, and video has caused the retro-fitting of a network to support non-native tr... 详细信息
来源: 评论
Comparison of Protection Mechanisms: Capacity Efficiency and Recovery Time
Comparison of Protection Mechanisms: Capacity Efficiency and...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: W. He A. K. Somani Dependable Computing & Networking Laboratory Department of Electrical & Computer Engineering Iowa State University Ames IA USA
High efficiency in capacity utilization and fast restoration are two primary goals of survivable design in optical networks. Shared backup path protection has been shown to be efficient in terms of capacity utilizatio... 详细信息
来源: 评论
Intentional dropping: A novel scheme for SYN flooding mitigation
Intentional dropping: A novel scheme for SYN flooding mitiga...
收藏 引用
INFOCOM 2006: 25th IEEE International Conference on computer Communications
作者: Al-Duwairi, Basheer Manimaran, G. Dependable Computing and Networking Laboratory Dept. of Electrical and Computer Engineering Iowa State University Ames IA 50011
This paper presents a novel scheme to mitigate the effect of SYN flooding attacks. The scheme, called intentional dropping based filtering, is based on the observation of client's persistence (i.e., client's r... 详细信息
来源: 评论
Intentional Dropping: A Novel Scheme for SYN Flooding Mitigation
Intentional Dropping: A Novel Scheme for SYN Flooding Mitiga...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: B. Al-Duwairi G. Manimaran Dependable Computing & Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IA USA
来源: 评论
Partitioned cache shadowing for deep sub-micron (DSM) regime
Partitioned cache shadowing for deep sub-micron (DSM) regime
收藏 引用
11th Pacific Rim International Symposium on dependable computing, PRDC 2005
作者: Heng, Xu Somani, Arun Dependable Computing and Networking Laboratory Electrical and Computer Engineering Iowa State University Ames IA 50011-3060
An important issue in modern cache designs is bridging the gap between wire and device delays. This warrants the use of more regular and modular structures to mask wire latencies. This paper advances the basic concept... 详细信息
来源: 评论
IP traffic grooming over WDM optical networks
IP traffic grooming over WDM optical networks
收藏 引用
2005 Conference onOptical Network Design and Modelling: Towards the broadband-for-all era, ONDM 2005
作者: Fang, Jing Somani, Arun K. Dependable Computing and Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IA 50011
IP over WDM has emerged as a winning network architecture to facilitate today's IP centric Internet. Although the total amount of bandwidth demands keeps increasing, there still exists a huge gap between the incre... 详细信息
来源: 评论
A p-cycle based survivable design for dynamic traffic in WDM networks
A p-cycle based survivable design for dynamic traffic in WDM...
收藏 引用
GLOBECOM'05: IEEE Global Telecommunications Conference, 2005
作者: He, Wensheng Fang, Jing Somani, Arun K. Dependable Computing and Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IO 50011
Achieving both high capacity efficiency and fast restoration speed is a primary goal of survivable design in WDM network. The p-cycle method aims to benefit from the fast restoration of ring-like protection and high c... 详细信息
来源: 评论
Game theory as a tool to strategize as well as predict nodes' behavior in peer-to-peer networks
Game theory as a tool to strategize as well as predict nodes...
收藏 引用
11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005
作者: Gupta, Rohit Somani, Arun K. Dependable Computing and Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IA 50011 United States
In this paper we use game theory to study nodes' behavior in peer-to-peer networks when nodes receive service based on their reputation. Reputation is used as a mechanism to incentivize nodes to share resources an... 详细信息
来源: 评论