咨询与建议

限定检索结果

文献类型

  • 70 篇 会议
  • 29 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 100 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51 篇 工学
    • 37 篇 计算机科学与技术...
    • 24 篇 软件工程
    • 18 篇 信息与通信工程
    • 8 篇 电气工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 控制科学与工程
    • 4 篇 仪器科学与技术
    • 3 篇 网络空间安全
    • 2 篇 机械工程
    • 2 篇 光学工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 21 篇 理学
    • 11 篇 数学
    • 6 篇 物理学
    • 4 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 8 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
    • 1 篇 药学(可授医学、理...
  • 1 篇 军事学

主题

  • 29 篇 computer network...
  • 18 篇 laboratories
  • 15 篇 bandwidth
  • 13 篇 intelligent netw...
  • 12 篇 optical fiber ne...
  • 11 篇 wdm networks
  • 11 篇 protection
  • 11 篇 telecommunicatio...
  • 10 篇 wavelength divis...
  • 9 篇 quality of servi...
  • 8 篇 routing
  • 6 篇 fault tolerance
  • 6 篇 computer archite...
  • 6 篇 real time system...
  • 5 篇 peer to peer com...
  • 5 篇 resource managem...
  • 5 篇 processor schedu...
  • 5 篇 web and internet...
  • 5 篇 ip networks
  • 4 篇 generative adver...

机构

  • 14 篇 state key labora...
  • 11 篇 dependable compu...
  • 7 篇 dependable compu...
  • 6 篇 dependable compu...
  • 6 篇 dependable compu...
  • 4 篇 nanyang technolo...
  • 4 篇 beijing universi...
  • 4 篇 the college of c...
  • 4 篇 the state key la...
  • 3 篇 dependable compu...
  • 3 篇 school of electr...
  • 3 篇 dependable compu...
  • 3 篇 college of compu...
  • 3 篇 dependable compu...
  • 3 篇 beijing laborato...
  • 3 篇 school of automa...
  • 3 篇 department of el...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 center for quant...

作者

  • 21 篇 a.k. somani
  • 15 篇 g. manimaran
  • 12 篇 somani arun k.
  • 10 篇 niyato dusit
  • 6 篇 zhang ping
  • 6 篇 manimaran g.
  • 5 篇 a. striegel
  • 5 篇 du hongyang
  • 5 篇 kang jiawen
  • 4 篇 xiong zehui
  • 4 篇 r. gupta
  • 4 篇 mingzhe chen
  • 4 篇 zhang ruichen
  • 4 篇 r. srinivasan
  • 3 篇 p. datta
  • 3 篇 sihua wang
  • 3 篇 b. al-duwairi
  • 3 篇 jing fang
  • 3 篇 m.t. frederick
  • 3 篇 fang jing

语言

  • 93 篇 英文
  • 7 篇 其他
  • 1 篇 中文
检索条件"机构=Dependable Computing and Networking Laboratory Department of Electrical and Computer Engineering"
100 条 记 录,以下是41-50 订阅
排序:
Comparison of Protection Mechanisms: Capacity Efficiency and Recovery Time
Comparison of Protection Mechanisms: Capacity Efficiency and...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: W. He A. K. Somani Dependable Computing & Networking Laboratory Department of Electrical & Computer Engineering Iowa State University Ames IA USA
High efficiency in capacity utilization and fast restoration are two primary goals of survivable design in optical networks. Shared backup path protection has been shown to be efficient in terms of capacity utilizatio... 详细信息
来源: 评论
Energy-aware scheduling with deadline and reliability constraints in wireless networks
Energy-aware scheduling with deadline and reliability constr...
收藏 引用
International Conference on Broadband Networks (BroadNets)
作者: G. Sudha Anil Kumar G. Manimaran Z. Wang Real Time Computing and Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IA USA
In this paper, we address the problem of scheduling a set of periodic real-time messages in a wireless network with the objective of minimizing the total energy consumption while meeting deadline and reliability const... 详细信息
来源: 评论
Energy-Aware Scheduling of Real-Time Tasks in Wireless Networked Embedded Systems
Energy-Aware Scheduling of Real-Time Tasks in Wireless Netwo...
收藏 引用
Real-Time Systems Symposium (RTSS)
作者: G. Sudha Anil Kumar G. Manimaran Z. Wang Real-Time Computing and Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IA USA
Recent technological advances have opened up several distributed real-time applications involving battery-driven embedded devices with local processing and wireless communication capabilities. Energy management is the... 详细信息
来源: 评论
Intentional dropping: A novel scheme for SYN flooding mitigation
Intentional dropping: A novel scheme for SYN flooding mitiga...
收藏 引用
INFOCOM 2006: 25th IEEE International Conference on computer Communications
作者: Al-Duwairi, Basheer Manimaran, G. Dependable Computing and Networking Laboratory Dept. of Electrical and Computer Engineering Iowa State University Ames IA 50011
This paper presents a novel scheme to mitigate the effect of SYN flooding attacks. The scheme, called intentional dropping based filtering, is based on the observation of client's persistence (i.e., client's r... 详细信息
来源: 评论
YAES - A modular simulator for mobile networks
YAES - A modular simulator for mobile networks
收藏 引用
8th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems
作者: Bölöni, Ladislau Turgut, Damla Networking and Mobile Computing Laboratory Electrical and Computer Engineering Department University of Central Florida
Developing network protocols for mobile wireless systems is a complex task, and most of the existing simulator frameworks are not well suited for experimental development. The YAES simulation framework was specificall... 详细信息
来源: 评论
Intentional Dropping: A Novel Scheme for SYN Flooding Mitigation
Intentional Dropping: A Novel Scheme for SYN Flooding Mitiga...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: B. Al-Duwairi G. Manimaran Dependable Computing & Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IA USA
来源: 评论
IP traffic grooming over WDM optical networks
IP traffic grooming over WDM optical networks
收藏 引用
2005 Conference onOptical Network Design and Modelling: Towards the broadband-for-all era, ONDM 2005
作者: Fang, Jing Somani, Arun K. Dependable Computing and Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IA 50011
IP over WDM has emerged as a winning network architecture to facilitate today's IP centric Internet. Although the total amount of bandwidth demands keeps increasing, there still exists a huge gap between the incre... 详细信息
来源: 评论
A p-cycle based survivable design for dynamic traffic in WDM networks
A p-cycle based survivable design for dynamic traffic in WDM...
收藏 引用
GLOBECOM'05: IEEE Global Telecommunications Conference, 2005
作者: He, Wensheng Fang, Jing Somani, Arun K. Dependable Computing and Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IO 50011
Achieving both high capacity efficiency and fast restoration speed is a primary goal of survivable design in WDM network. The p-cycle method aims to benefit from the fast restoration of ring-like protection and high c... 详细信息
来源: 评论
Partitioned cache shadowing for deep sub-micron (DSM) regime
Partitioned cache shadowing for deep sub-micron (DSM) regime
收藏 引用
11th Pacific Rim International Symposium on dependable computing, PRDC 2005
作者: Heng, Xu Somani, Arun Dependable Computing and Networking Laboratory Electrical and Computer Engineering Iowa State University Ames IA 50011-3060
An important issue in modern cache designs is bridging the gap between wire and device delays. This warrants the use of more regular and modular structures to mask wire latencies. This paper advances the basic concept... 详细信息
来源: 评论
Game theory as a tool to strategize as well as predict nodes' behavior in peer-to-peer networks
Game theory as a tool to strategize as well as predict nodes...
收藏 引用
11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005
作者: Gupta, Rohit Somani, Arun K. Dependable Computing and Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IA 50011 United States
In this paper we use game theory to study nodes' behavior in peer-to-peer networks when nodes receive service based on their reputation. Reputation is used as a mechanism to incentivize nodes to share resources an... 详细信息
来源: 评论