Results 1 - 10
of
887
2004 Toward standard testbeds for numerical relativity
"... In recent years, many different numerical evolution schemes for Einstein’s equations have been proposed to address stability and accuracy problems that have plagued the numerical relativity community for decades. Some of these approaches have been tested on different spacetimes, and conclusions have ..."
Abstract
-
Cited by 10 (5 self)
- Add to MetaCart
have been drawn based on these tests. However, differences in results originate from many sources, including not only formulations of the equations, but also gauges, boundary conditions, numerical methods, and so on. We propose to build up a suite of standardized testbeds for comparing approaches
The R*-tree: an efficient and robust access method for points and rectangles
- INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA
, 1990
"... The R-tree, one of the most popular access methods for rectangles, is based on the heuristic optimization of the area of the enclosing rectangle in each inner node. By running numerous experiments in a standardized testbed under highly varying data, queries and operations, we were able to design the ..."
Abstract
-
Cited by 1262 (74 self)
- Add to MetaCart
The R-tree, one of the most popular access methods for rectangles, is based on the heuristic optimization of the area of the enclosing rectangle in each inner node. By running numerous experiments in a standardized testbed under highly varying data, queries and operations, we were able to design
OpenFlow: Enabling Innovation in Campus Networks
, 2008
"... This whitepaper proposes OpenFlow: a way for researchers to run experimental protocols in the networks they use every day. OpenFlow is based on an Ethernet switch, with an internal flow-table, and a standardized interface to add and remove flow entries. Our goal is to encourage networking vendors ..."
Abstract
-
Cited by 718 (84 self)
- Add to MetaCart
This whitepaper proposes OpenFlow: a way for researchers to run experimental protocols in the networks they use every day. OpenFlow is based on an Ethernet switch, with an internal flow-table, and a standardized interface to add and remove flow entries. Our goal is to encourage networking vendors
Class. Quantum Grav. 21 (2004) 589–613 PII: S0264-9381(04)63065-6 Towards standard testbeds for numerical relativity
, 2003
"... In recent years, many different numerical evolution schemes for Einstein’s equations have been proposed to address stability and accuracy problems that have plagued the numerical relativity community for decades. Some of these approaches have been tested on different spacetimes, and conclusions have ..."
Abstract
- Add to MetaCart
have been drawn based on these tests. However, differences in results originate from many sources, including not only formulations of the equations, but also gauges, boundary conditions, numerical methods and so on. We propose to build up a suite of standardized testbeds for comparing approaches
Comparative Investigation of ARP Poisoning Mitigation Techniques using Standard Testbed for Wireless Networks
"... Due to the increasing demand of wireless networks, there is an increasing necessity for security as well. This is because unlike wired networks, wireless networks can be easily hacked form outside the building if proper security measures are not in place as wireless networks make use of radio waves ..."
Abstract
- Add to MetaCart
Due to the increasing demand of wireless networks, there is an increasing necessity for security as well. This is because unlike wired networks, wireless networks can be easily hacked form outside the building if proper security measures are not in place as wireless networks make use of radio waves and radio waves can leak outside of building at distances up to 300 feet or more. So everything we do on our network can be monitored by anyone who has wireless capabilities. This unauthorized access can be used as an essence by the hacker to launch various kinds of attacks like man-in-the-middle attacks, denial of service attacks, IP spoofing etc. As a result in addition to the firewalls, password protection techniques, virus detectors etc, additional levels of security is needed to secure the wireless networks. This paper focuses on comparing various techniques that are used to protect the users from these attacks by providing practical observations based on the network parameters time and scalability and also highlighted the best method in the end to combat the attacks at a superior level.
X-mac: A short preamble mac protocol for duty-cycled wireless sensor networks
- in SenSys
, 2006
"... In this paper we present X-MAC, a low power MAC protocol for wireless sensor networks (WSNs). Standard MAC protocols developed for duty-cycled WSNs such as B-MAC, which is the default MAC protocol for TinyOS, employ an extended preamble and preamble sampling. While this “low power listening ” approa ..."
Abstract
-
Cited by 360 (0 self)
- Add to MetaCart
In this paper we present X-MAC, a low power MAC protocol for wireless sensor networks (WSNs). Standard MAC protocols developed for duty-cycled WSNs such as B-MAC, which is the default MAC protocol for TinyOS, employ an extended preamble and preamble sampling. While this “low power listening
Collection Tree Protocol.
- Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys’09),
, 2009
"... Abstract This paper presents and evaluates two principles for wireless routing protocols. The first is datapath validation: data traffic quickly discovers and fixes routing inconsistencies. The second is adaptive beaconing: extending the Trickle algorithm to routing control traffic reduces route re ..."
Abstract
-
Cited by 339 (16 self)
- Add to MetaCart
repair latency and sends fewer beacons. We evaluate datapath validation and adaptive beaconing in CTP Noe, a sensor network tree collection protocol. We use 12 different testbeds ranging in size from 20-310 nodes, comprising seven platforms, and six different link layers, on both interference
Results 1 - 10
of
887