Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Throughput
biblio
Multimedia Support in Wireless Mesh Networks Using Interval Type-2 Fuzzy Logic System
Submitted by BrandonB on Fri, 05/01/2015 - 9:46am
QoS violation
wireless mesh networks
Wireless communication
traffic type
traffic sending rate
traffic regulation scheme
traffic load scale
Throughput
telecommunication traffic
telecommunication congestion control
static routers
regulation process
real-time systems
queuing delays
queueing theory
quality of service
Ad hoc networks
QoS requirements
Protocols
network state
multimedia support
mobile ad hoc networks
mesh routers
Load management
lightly loaded buffers
interval type-2 fuzzy logic system
heavy traffic load
fuzzy control
delays
dedicated QoS protocols
buffer evolution
biblio
Energy efficient techniques in Wireless Mesh Network
Submitted by BrandonB on Fri, 05/01/2015 - 9:45am
Logic gates
WMN
wireless network architecture
wireless mesh networks
wireless mesh network
Wireless communication
Throughput
smart devices
Routing
bandwidth hungry applications
IEEE 802.11 Standards
Evolution
energy efficient techniques
energy efficient network
Energy Efficiency
energy conservation
energy aware techniques
biblio
A characterization of uncoordinated frequency hopping for wireless secrecy
Submitted by BrandonB on Fri, 05/01/2015 - 8:16am
spread spectrum communication
wireless transmissions
wireless secrecy
Wireless communication
uncoordinated frequency hopping characterization
Time-frequency Analysis
Throughput
telecommunication security
spread spectrum scheme
communication secrecy level
security
secret-key exchange
radio transmitters
radio receivers
Jamming
Interference
Cryptography
biblio
Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources
Submitted by BrandonB on Thu, 04/30/2015 - 2:13pm
Cloud Computing
delays
IP networks
security
Synchronization
Throughput
Virtualization
biblio
On a Mathematical Model for Low-Rate Shrew DDoS
Submitted by BrandonB on Thu, 04/30/2015 - 1:17pm
low-rate shrew DDoS
transport protocols
transport control protocol
Throughput
TCP flows
TCP congestion window
shrew distributed denial-of-service
shrew attack
Packet loss
network environments
Mathematical model
Adaptation models
low-rate distributed denial of service (DDoS) attack
internet
delays
computer network security
Computer crime
bottleneck bandwidth
Bandwidth
attack pattern
attack effect estimation
Attack effect
« first
‹ previous
…
13
14
15
16
17
18
19
20
21