咨询与建议

限定检索结果

文献类型

  • 53 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 54 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19 篇 工学
    • 17 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 6 篇 信息与通信工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 安全科学与工程
  • 8 篇 理学
    • 6 篇 数学
    • 3 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 3 篇 工商管理

主题

  • 27 篇 computer network...
  • 16 篇 laboratories
  • 14 篇 bandwidth
  • 12 篇 optical fiber ne...
  • 11 篇 wdm networks
  • 11 篇 intelligent netw...
  • 11 篇 protection
  • 10 篇 wavelength divis...
  • 10 篇 telecommunicatio...
  • 7 篇 quality of servi...
  • 6 篇 routing
  • 6 篇 fault tolerance
  • 6 篇 computer archite...
  • 5 篇 peer to peer com...
  • 5 篇 web and internet...
  • 4 篇 application soft...
  • 4 篇 real time system...
  • 4 篇 optical design
  • 4 篇 resource managem...
  • 4 篇 analytical model...

机构

  • 11 篇 dependable compu...
  • 7 篇 dependable compu...
  • 6 篇 dependable compu...
  • 6 篇 dependable compu...
  • 3 篇 dependable compu...
  • 3 篇 dependable compu...
  • 3 篇 dependable compu...
  • 1 篇 dependable compu...
  • 1 篇 dependable compu...
  • 1 篇 department of el...
  • 1 篇 information syst...
  • 1 篇 state key labora...
  • 1 篇 dependable compu...
  • 1 篇 dependable netwo...
  • 1 篇 key laboratory o...
  • 1 篇 real-time comput...
  • 1 篇 dependable compu...
  • 1 篇 the dependable c...
  • 1 篇 dependable compu...
  • 1 篇 network mathemat...

作者

  • 20 篇 a.k. somani
  • 13 篇 g. manimaran
  • 10 篇 somani arun k.
  • 7 篇 manimaran g.
  • 5 篇 a. striegel
  • 4 篇 r. gupta
  • 4 篇 r. srinivasan
  • 3 篇 p. datta
  • 3 篇 b. al-duwairi
  • 3 篇 jing fang
  • 3 篇 m.t. frederick
  • 3 篇 fang jing
  • 2 篇 s. swaminathan
  • 2 篇 sangireddy rama
  • 2 篇 wensheng he
  • 2 篇 kim huesung
  • 2 篇 al-omari r.
  • 2 篇 heng xu
  • 2 篇 srinivasan r.
  • 2 篇 swaminathan s.

语言

  • 54 篇 英文
检索条件"机构=Dependable Computing & Networking Laboratory Dept of Electrical and Computer Engineering"
54 条 记 录,以下是11-20 订阅
排序:
Intentional dropping: a novel scheme for SYN flooding mitigation
Intentional dropping: a novel scheme for SYN flooding mitiga...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: B. Al-Duwairi G. Manimaran Dept. of Electrical and Computer Engineering Dependable Computing & Networking Laboratory Iowa State University Ames IA Dept. of Electrical and Computer Engineering Dependable Computing & Networking Laboratory Iowa State University Ames IA USA
This paper presents a novel scheme to mitigate the effect of SYN flooding attacks. The scheme, called intentional dropping based filtering, is based on the observation of client's persistence (i.e., client's r... 详细信息
来源: 评论
An intra-task DVS algorithm exploiting program path locality for real-time embedded systems
收藏 引用
12th International Conference on High Performance computing, HiPC 2005
作者: Kumar, G. Sudha Anil Manimaran, G. Real-Time Computing and Networking Laboratory Dept. of Electrical and Computer Engineering Iowa State University Ames IA 50011 United States
In this paper, we present a novel intra-task Dynamic Voltage Scheduling (DVS) algorithm based on the knowledge of frequently executed paths in the control flow graph for real-time embedded systems. The basic idea is t... 详细信息
来源: 评论
Partitioned cache shadowing for deep sub-micron (DSM) regime
Partitioned cache shadowing for deep sub-micron (DSM) regime
收藏 引用
Pacific Rim International Symposium on dependable computing
作者: Heng Xu A. Somani Dependable Computing and Networking Laboratory Electrical and Computer Engineering Iowa State University Ames IA USA
An important issue in modern cache designs is bridging the gap between wire and device delays. This warrants the use of more regular and modular structures to mask wire latencies. This paper advances the basic concept... 详细信息
来源: 评论
A p-cycle based survivable design for dynamic traffic in WDM networks
A p-cycle based survivable design for dynamic traffic in WDM...
收藏 引用
IEEE Conference and Exhibition on Global Telecommunications (GLOBECOM)
作者: Wensheng He Jing Fang A.K. Somani Dependable Computing & Networking Laboratory Department of Electrical & Computer Engineering Iowa State University Ames IA USA
Achieving both high capacity efficiency and fast restoration speed is a primary goal of survivable design in WDM network. The p-cycle method aims to benefit from the fast restoration of ring-like protection and high c... 详细信息
来源: 评论
Network selection using fuzzy logic
Network selection using fuzzy logic
收藏 引用
International Conference on Broadband Networks (BroadNets)
作者: S. Kher A.K. Somani R. Gupta Dependable Computing and Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IA USA
The peer-to-peer technology offers many advantages, but at the same time, it poses many novel challenges for the research community. Modern peer-to-peer systems are characterized by large scale, poor reliability, and ... 详细信息
来源: 评论
Real-time H/W implementation of the approximate discrete Radon transform
Real-time H/W implementation of the approximate discrete Rad...
收藏 引用
International Conference on Application Specific Systems (ASAP), Architectures and Processors
作者: M.T. Frederick N.A. VanderHorn A.K. Somani Dependable Computing and Networking Laboratory Department of Electrical & Computer Engineering Iowa State University Ames IA USA
The Radon transform (RT) is a widely studied algorithm used to perform image pattern extraction in fields such as computer graphics, medical imagery, and avionics. Real time implementation of the discrete RT (DRT) is ... 详细信息
来源: 评论
Game theory as a tool to strategize as well as predict nodes' behavior in peer-to-peer networks
Game theory as a tool to strategize as well as predict nodes...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: R. Gupta A.K. Somani Dependable Computing and Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IA USA
In this paper we use game theory to study nodes' behavior in peer-to-peer networks when nodes receive service based on their reputation. Reputation is used as a mechanism to incentivize nodes to share resources an... 详细信息
来源: 评论
IP traffic grooming over WDM optical networks
IP traffic grooming over WDM optical networks
收藏 引用
International Conference on Optical Network Design and Modeling, ONDM
作者: Jing Fang A.K. Somani Dependable Computing & Networking Laboratory Department of Electrical & Computer Engineering Iowa State University Ames IA USA
来源: 评论
CompuP2P: a light-weight architecture for Internet computing
CompuP2P: a light-weight architecture for Internet computing
收藏 引用
International Conference on Broadband Networks (BroadNets)
作者: V. Sekhri R. Gupta A.K. Somani Dependable Computing and Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IA USA
Internet computing is emerging as an important new paradigm in which resource intensive computing is integrated over Internet-scale networks. Over these large networks, different users and organizations share their co... 详细信息
来源: 评论
Evaluating dual-failure restorability in mesh-restorable WDM optical networks
Evaluating dual-failure restorability in mesh-restorable WDM...
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: M.T. Frederick P. Datta A.K. Somani Dependable Computing & Networking Laboratory Department of Electrical & Computer Engineering Iowa State University Ames IA USA
Double link failure models, in which any two links in the network fail in an arbitrary order, are becoming critical in survivable optical network design. A significant finding is that designs offering complete dual-fa... 详细信息
来源: 评论