• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 887
Next 10 →

2004 Toward standard testbeds for numerical relativity

by Miguel Alcubierre, Gabrielle Allen, Carles Bona, David Fiske, Tom Goodale, F. Siddhartha, Ian Hawke, Scott H. Hawley, Sascha Husa, Autónoma México
"... In recent years, many different numerical evolution schemes for Einstein’s equations have been proposed to address stability and accuracy problems that have plagued the numerical relativity community for decades. Some of these approaches have been tested on different spacetimes, and conclusions have ..."
Abstract - Cited by 10 (5 self) - Add to MetaCart
have been drawn based on these tests. However, differences in results originate from many sources, including not only formulations of the equations, but also gauges, boundary conditions, numerical methods, and so on. We propose to build up a suite of standardized testbeds for comparing approaches

The R*-tree: an efficient and robust access method for points and rectangles

by Norbert Beckmann, Hans-Peter Kriegel, Ralf Schneider, Bernhard Seeger - INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA , 1990
"... The R-tree, one of the most popular access methods for rectangles, is based on the heuristic optimization of the area of the enclosing rectangle in each inner node. By running numerous experiments in a standardized testbed under highly varying data, queries and operations, we were able to design the ..."
Abstract - Cited by 1262 (74 self) - Add to MetaCart
The R-tree, one of the most popular access methods for rectangles, is based on the heuristic optimization of the area of the enclosing rectangle in each inner node. By running numerous experiments in a standardized testbed under highly varying data, queries and operations, we were able to design

OpenFlow: Enabling Innovation in Campus Networks

by Nick McKeown , Tom Anderson, Hari Balakrishnan, Guru Parulkar, Larry Peterson, Jennifer Rexford, Scott Shenker, Jonathan Turner , 2008
"... This whitepaper proposes OpenFlow: a way for researchers to run experimental protocols in the networks they use every day. OpenFlow is based on an Ethernet switch, with an internal flow-table, and a standardized interface to add and remove flow entries. Our goal is to encourage networking vendors ..."
Abstract - Cited by 718 (84 self) - Add to MetaCart
This whitepaper proposes OpenFlow: a way for researchers to run experimental protocols in the networks they use every day. OpenFlow is based on an Ethernet switch, with an internal flow-table, and a standardized interface to add and remove flow entries. Our goal is to encourage networking vendors

Class. Quantum Grav. 21 (2004) 589–613 PII: S0264-9381(04)63065-6 Towards standard testbeds for numerical relativity

by Miguel Alcubierre, Gabrielle Allen, Carles Bona, David Fiske, Tom Goodale, F Siddhartha Guzmán, Ian Hawke, Scott H Hawley, Sascha Husa, Christiane Lechner, Denis Pollney, David Rideout, Marcelo Salgado, Erik Schnetter, Edward Seidel, Hisa-aki Shinkai, Deirdre Shoemaker, Ryoji Takahashi, Jeff Winicour , 2003
"... In recent years, many different numerical evolution schemes for Einstein’s equations have been proposed to address stability and accuracy problems that have plagued the numerical relativity community for decades. Some of these approaches have been tested on different spacetimes, and conclusions have ..."
Abstract - Add to MetaCart
have been drawn based on these tests. However, differences in results originate from many sources, including not only formulations of the equations, but also gauges, boundary conditions, numerical methods and so on. We propose to build up a suite of standardized testbeds for comparing approaches

Comparative Investigation of ARP Poisoning Mitigation Techniques using Standard Testbed for Wireless Networks

by Goldendeep Kaur, Jyoteesh Malhotra Phd
"... Due to the increasing demand of wireless networks, there is an increasing necessity for security as well. This is because unlike wired networks, wireless networks can be easily hacked form outside the building if proper security measures are not in place as wireless networks make use of radio waves ..."
Abstract - Add to MetaCart
Due to the increasing demand of wireless networks, there is an increasing necessity for security as well. This is because unlike wired networks, wireless networks can be easily hacked form outside the building if proper security measures are not in place as wireless networks make use of radio waves and radio waves can leak outside of building at distances up to 300 feet or more. So everything we do on our network can be monitored by anyone who has wireless capabilities. This unauthorized access can be used as an essence by the hacker to launch various kinds of attacks like man-in-the-middle attacks, denial of service attacks, IP spoofing etc. As a result in addition to the firewalls, password protection techniques, virus detectors etc, additional levels of security is needed to secure the wireless networks. This paper focuses on comparing various techniques that are used to protect the users from these attacks by providing practical observations based on the network parameters time and scalability and also highlighted the best method in the end to combat the attacks at a superior level.

X-mac: A short preamble mac protocol for duty-cycled wireless sensor networks

by Michael Buettner, Gary V. Yee, Eric Anderson, Richard Han - in SenSys , 2006
"... In this paper we present X-MAC, a low power MAC protocol for wireless sensor networks (WSNs). Standard MAC protocols developed for duty-cycled WSNs such as B-MAC, which is the default MAC protocol for TinyOS, employ an extended preamble and preamble sampling. While this “low power listening ” approa ..."
Abstract - Cited by 360 (0 self) - Add to MetaCart
In this paper we present X-MAC, a low power MAC protocol for wireless sensor networks (WSNs). Standard MAC protocols developed for duty-cycled WSNs such as B-MAC, which is the default MAC protocol for TinyOS, employ an extended preamble and preamble sampling. While this “low power listening

Collection Tree Protocol.

by Omprakash Gnawali , Rodrigo Fonseca , Kyle Jamieson , David Moss , Rincon Research , Philip Levis - Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys’09), , 2009
"... Abstract This paper presents and evaluates two principles for wireless routing protocols. The first is datapath validation: data traffic quickly discovers and fixes routing inconsistencies. The second is adaptive beaconing: extending the Trickle algorithm to routing control traffic reduces route re ..."
Abstract - Cited by 339 (16 self) - Add to MetaCart
repair latency and sends fewer beacons. We evaluate datapath validation and adaptive beaconing in CTP Noe, a sensor network tree collection protocol. We use 12 different testbeds ranging in size from 20-310 nodes, comprising seven platforms, and six different link layers, on both interference

unknown title

by M C Babiuc, S Husa, D Alic, I Hinder, C Lechner, E Schnetter, B Szilágyi, Y Zlochower, N Dorb, D Pollney, J Winicour , 709
"... Implementation of standard testbeds for numerical relativity ..."
Abstract - Add to MetaCart
Implementation of standard testbeds for numerical relativity

unknown title

by M C Babiuc, S Husa, D Alic, I Hinder, C Lechner, E Schnetter, B Szilágyi, Y Zlochower, N Dorb, D Pollney, J Winicour , 709
"... Implementation of standard testbeds for numerical relativity ..."
Abstract - Add to MetaCart
Implementation of standard testbeds for numerical relativity

unknown title

by M C Babiuc, S Husa, I Hinder, C Lechner, E Schnetter, B Szilágyi, Y Zlochower, N Dorb, D Pollney, J Winicour , 709
"... Implementation of standard testbeds for numerical relativity ..."
Abstract - Add to MetaCart
Implementation of standard testbeds for numerical relativity
Next 10 →
Results 1 - 10 of 887
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University