搜索结果: 136-150 共查到“知识库 计算机系统结构”相关记录6880条 . 查询时间(0.758 秒)
Adaptive management of network resources
Power control rate control utility functions optimization and control adaptation
2015/8/11
This paper describes a new adaptive algorithm that smoothly and dynamically adjusts the system resources of link rates and transmitter powers to maximize the performance of the system. Performance is ...
Managing power consumption in networks on chips
Energy management low power regenerative stochastic processes system analysis and design
2015/8/11
In this work we present a new methodology for managing power consumption of NOCs, which we formulate using closed-loop control concepts, by introducing an estimator and a controller that implement the...
Throughput-centric routing algorithm design
Obliviousrouting interconnection networks multicommodityfl ows
2015/8/11
The increasing application space of interconnection networks now encompasses several applications, such as packet routing and I/O interconnect, where the throughput of a routing algorithm, not just it...
MP-DSM: a distributed cross layer network control protocol
network management TCP optimization control QoS cross layer utility functions
2015/8/11
We present a distributed cross layer approach to controlling the network performance under various QoS requirements in interference limited systems. The interaction between the different layers of the...
Analysis and optimization of randomized gossip algorithms
Distributed network gossip constraints the algorithm the iterative sequence markov chain
2015/8/11
We study the distributed averaging problem on an arbitrary network with a gossip constraint, which means that no node communicates with more than one neighbour in every time slot. We consider algorith...
A decomposition approach to distributed analysis of networked systems
Distributed algorithm analysis stable system coupling linear matrix inequality the semidefinite programming
2015/8/11
We present a simple distributed algorithm for analyzing well-posedness and stability of a system composed of different sub-units, interconnected over an arbitrary graph. The procedure consists in solv...
Gossip algorithms: Design, analysis, and applications
Sensor AD hoc network distributed asynchronous algorithm gossip algorithm network energy resources gossip algorithm
2015/8/11
Motivated by applications to sensor, peer-to-peer and ad hoc networks, we study distributed asynchronous algorithms, also known as gossip algorithms, for computation and information exchange in an arb...
Distributed average consensus with time-varying metropolis weights
Average consensus Distributed computing Metropolis algorithm
2015/8/10
Given a network of processes where each node has an initial scalar value, we consider the problem of computing their average asymptotically using a distributed, linear iterative algorithm. At each ite...
Distributed estimation via dual decomposition
Distributed framework convex optimization sensor networks signal processing subsystem sensor subsystem distributed estimation algorithm
2015/8/10
The focus of this paper is to develop a framework for distributed estimation via convex optimization. We deal with a network of complex sensor subsystems with local estimation and signal processing. M...
A heuristic for optimizing stochastic activity networks with applications to statistical digital circuit sizing
Network priority constraints network performance measurement and random networks random variables probability distribution
2015/8/10
A deterministic activity network (DAN) is a collection of activities, each with some duration, along with a set of precedence constraints, which specify that activities begin only when certain others ...
Model Checking Large Network Protocol Implementations
Model Checking Large Network Protocol Implementations
2015/8/7
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks. However, network pro...
We present a system that enables a user to remove a file from both the file system and all the backup tapes on which the file is stored. The ability to remove files from all backup tapes is desirable ...
Today, Internet traffic is encrypted only when deemed necessary. Yet modern CPUs could feasibly encrypt most traffic and the cost of doing so will only drop over time. Tcpcrypt is a TCP extension desi...
We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of the target binary or source code, against services that restart after a crash. This makes it pos...
Forward secrecy guarantees that eavesdroppers simply cannot reveal secret data of past communications. While many TLS servers have deployed the ephemeral Diffie-Hellman (DHE) key exchange to support f...