咨询与建议

限定检索结果

文献类型

  • 70 篇 会议
  • 30 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 101 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52 篇 工学
    • 37 篇 计算机科学与技术...
    • 24 篇 软件工程
    • 19 篇 信息与通信工程
    • 9 篇 电气工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 控制科学与工程
    • 4 篇 仪器科学与技术
    • 3 篇 网络空间安全
    • 2 篇 机械工程
    • 2 篇 光学工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 21 篇 理学
    • 11 篇 数学
    • 6 篇 物理学
    • 4 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 8 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
    • 1 篇 药学(可授医学、理...
  • 1 篇 军事学

主题

  • 30 篇 computer network...
  • 18 篇 laboratories
  • 15 篇 bandwidth
  • 13 篇 intelligent netw...
  • 12 篇 optical fiber ne...
  • 11 篇 wdm networks
  • 11 篇 protection
  • 11 篇 telecommunicatio...
  • 10 篇 wavelength divis...
  • 9 篇 quality of servi...
  • 8 篇 routing
  • 6 篇 fault tolerance
  • 6 篇 computer archite...
  • 6 篇 real time system...
  • 5 篇 peer to peer com...
  • 5 篇 resource managem...
  • 5 篇 processor schedu...
  • 5 篇 web and internet...
  • 5 篇 ip networks
  • 4 篇 generative adver...

机构

  • 14 篇 state key labora...
  • 11 篇 dependable compu...
  • 7 篇 dependable compu...
  • 6 篇 dependable compu...
  • 6 篇 dependable compu...
  • 4 篇 beijing universi...
  • 4 篇 the college of c...
  • 4 篇 the state key la...
  • 3 篇 dependable compu...
  • 3 篇 school of electr...
  • 3 篇 nanyang technolo...
  • 3 篇 dependable compu...
  • 3 篇 college of compu...
  • 3 篇 dependable compu...
  • 3 篇 beijing laborato...
  • 3 篇 school of automa...
  • 3 篇 department of el...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 center for quant...

作者

  • 21 篇 a.k. somani
  • 15 篇 g. manimaran
  • 12 篇 somani arun k.
  • 10 篇 niyato dusit
  • 6 篇 zhang ping
  • 6 篇 manimaran g.
  • 5 篇 a. striegel
  • 5 篇 du hongyang
  • 5 篇 kang jiawen
  • 4 篇 xiong zehui
  • 4 篇 r. gupta
  • 4 篇 mingzhe chen
  • 4 篇 zhang ruichen
  • 4 篇 r. srinivasan
  • 3 篇 p. datta
  • 3 篇 sihua wang
  • 3 篇 b. al-duwairi
  • 3 篇 jing fang
  • 3 篇 m.t. frederick
  • 3 篇 fang jing

语言

  • 91 篇 英文
  • 10 篇 其他
  • 1 篇 中文
检索条件"机构=Dependable Computing and Networking Laboratory Department of Electrical and Computer Engineering"
101 条 记 录,以下是51-60 订阅
排序:
A p-cycle based survivable design for dynamic traffic in WDM networks
A p-cycle based survivable design for dynamic traffic in WDM...
收藏 引用
IEEE Conference and Exhibition on Global Telecommunications (GLOBECOM)
作者: Wensheng He Jing Fang A.K. Somani Dependable Computing & Networking Laboratory Department of Electrical & Computer Engineering Iowa State University Ames IA USA
Achieving both high capacity efficiency and fast restoration speed is a primary goal of survivable design in WDM network. The p-cycle method aims to benefit from the fast restoration of ring-like protection and high c... 详细信息
来源: 评论
Network selection using fuzzy logic
Network selection using fuzzy logic
收藏 引用
International Conference on Broadband Networks (BroadNets)
作者: S. Kher A.K. Somani R. Gupta Dependable Computing and Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IA USA
The peer-to-peer technology offers many advantages, but at the same time, it poses many novel challenges for the research community. Modern peer-to-peer systems are characterized by large scale, poor reliability, and ... 详细信息
来源: 评论
Real-time H/W implementation of the approximate discrete Radon transform
Real-time H/W implementation of the approximate discrete Rad...
收藏 引用
International Conference on Application Specific Systems (ASAP), Architectures and Processors
作者: M.T. Frederick N.A. VanderHorn A.K. Somani Dependable Computing and Networking Laboratory Department of Electrical & Computer Engineering Iowa State University Ames IA USA
The Radon transform (RT) is a widely studied algorithm used to perform image pattern extraction in fields such as computer graphics, medical imagery, and avionics. Real time implementation of the discrete RT (DRT) is ... 详细信息
来源: 评论
Game theory as a tool to strategize as well as predict nodes' behavior in peer-to-peer networks
Game theory as a tool to strategize as well as predict nodes...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: R. Gupta A.K. Somani Dependable Computing and Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IA USA
In this paper we use game theory to study nodes' behavior in peer-to-peer networks when nodes receive service based on their reputation. Reputation is used as a mechanism to incentivize nodes to share resources an... 详细信息
来源: 评论
IP traffic grooming over WDM optical networks
IP traffic grooming over WDM optical networks
收藏 引用
International Conference on Optical Network Design and Modeling, ONDM
作者: Jing Fang A.K. Somani Dependable Computing & Networking Laboratory Department of Electrical & Computer Engineering Iowa State University Ames IA USA
来源: 评论
CompuP2P: a light-weight architecture for Internet computing
CompuP2P: a light-weight architecture for Internet computing
收藏 引用
International Conference on Broadband Networks (BroadNets)
作者: V. Sekhri R. Gupta A.K. Somani Dependable Computing and Networking Laboratory Department of Electrical and Computer Engineering Iowa State University Ames IA USA
Internet computing is emerging as an important new paradigm in which resource intensive computing is integrated over Internet-scale networks. Over these large networks, different users and organizations share their co... 详细信息
来源: 评论
Intentional dropping: a novel scheme for SYN flooding mitigation
Intentional dropping: a novel scheme for SYN flooding mitiga...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: B. Al-Duwairi G. Manimaran Dept. of Electrical and Computer Engineering Dependable Computing & Networking Laboratory Iowa State University Ames IA Dept. of Electrical and Computer Engineering Dependable Computing & Networking Laboratory Iowa State University Ames IA USA
This paper presents a novel scheme to mitigate the effect of SYN flooding attacks. The scheme, called intentional dropping based filtering, is based on the observation of client's persistence (i.e., client's r... 详细信息
来源: 评论
Partitioned cache shadowing for deep sub-micron (DSM) regime
Partitioned cache shadowing for deep sub-micron (DSM) regime
收藏 引用
Pacific Rim International Symposium on dependable computing
作者: Heng Xu A. Somani Dependable Computing and Networking Laboratory Electrical and Computer Engineering Iowa State University Ames IA USA
An important issue in modern cache designs is bridging the gap between wire and device delays. This warrants the use of more regular and modular structures to mask wire latencies. This paper advances the basic concept... 详细信息
来源: 评论
Database caching in MANETs based on separation of queries and responses
Database caching in MANETs based on separation of queries an...
收藏 引用
IEEE International Conference on Wireless and Mobile computing, networking And Communications (WiMob)
作者: H. Artail H. Safa S. Pierre Electrical and Computer Engineering department American University of Beirut Beirut Lebanon Mobile Computing and Networking Research Laboratory (LARIM) Department of Computer Engineering Ecole Polytechnique de Montreal Montreal Canada Department of Computer Science American University of Beirut Beirut Lebanon
This paper proposes a model for caching database data in mobile ad-hoc networks through caching the queries and their responses. The approach makes a distinction between the queries and their responses and caches them... 详细信息
来源: 评论
Adaptive approach for QoS support in IEEE 802.11e wireless LAN
Adaptive approach for QoS support in IEEE 802.11e wireless L...
收藏 引用
IEEE International Conference on Wireless and Mobile computing, networking And Communications (WiMob)
作者: J. Naoum-Sawaya B. Ghaddar S. Khawam H. Safa H. Artail Z. Dawy Department of Electrical and Computer Engineering American University of Beirut Beirut Lebanon Mobile Computing and Networking Research Laboratory (LARIM) Ecole Polytechnique de Montreal Montreal Canada Department of Computer Science American University of Beirut Beirut Lebanon
the IEEE 802.11e standard has been introduced recently for providing quality of service (QoS) capabilities in the emerging wireless local area networks. This standard introduces a contention window based enhanced dist... 详细信息
来源: 评论