Zobrazeno 1 - 10
of 41
pro vyhledávání: '"David J. Thuente"'
Publikováno v:
Journal of Parallel and Distributed Computing. 104:88-98
In evaluating the performance of highly complex networked systems, emulation is often used as it maintains much of the realism of testbeds, while offering increased flexibility and scalability. In large emulation systems, multiple and heterogeneous v
Autor:
David J. Thuente, Zifan Li
Publikováno v:
MoWNet
Modular-based channel hopping (CH) rendezvous algorithms can provide guaranteed rendezvous for Cognitive Radio Networks (CRNs) without time synchronization or Common Control Channels (i.e., blind rendezvous). The Enhanced Jump-Stay (EJS) scheme [1] h
Publikováno v:
The International Journal of High Performance Computing Applications. 29:166-183
Building a testbed for evaluating the performance of large-scale heterogeneous systems can be costly and inefficient. Emulation is often used to evaluate the performance of a system in a controlled environment. Time dilation allows virtual machines (
Autor:
Young-Hyun Oh, David J. Thuente
Publikováno v:
WoWMoM
Modular-based channel hopping (CH) rendezvous algorithms can provide guaranteed rendezvous for Cognitive Radio Networks (CRNs) without time synchronization or Common Control Channels (i.e., blind rendezvous). Recently, the Enhanced Jump-Stay (EJS) sc
Autor:
Xinxin Sheng, David J. Thuente
Publikováno v:
KI - Künstliche Intelligenz. 25:53-56
A general game playing agent understands the formal descriptions of an arbitrary game in the multi-agent environment and learns to play the given games without human intervention. In this paper, we present an agent that automatically extracts common
Autor:
David J. Thuente, Yang Song
Publikováno v:
FIE
Although authorized cheat-sheets have been widely accepted as a common examination format, their effectiveness is still being questioned. Some researchers believe authorized cheat-sheets are more like a "crutch" and have no effect on students' perfor
Autor:
David J. Thuente, Young-Hyun Oh
Publikováno v:
GLOBECOM
Recently, blind rendezvous algorithms have been proposed for cognitive radio networks due to the limitations of centralized servers or common control channels. However, these algorithms are vulnerable to our Channel Detecting Jamming Attacks (CDJAs)
Publikováno v:
2014 11th Annual High Capacity Optical Networks and Emerging/Enabling Technologies (Photonics for Energy).
Service providers who dynamically scale cloud resources can significantly lower costs while providing a service level that conforms to a service level agreement. To do this, service providers must understand the tradeoffs within provisioning algorith
Autor:
Gaurav Patwardhan, David J. Thuente
Publikováno v:
2014 IEEE Military Communications Conference.
Wireless LAN systems (WLAN) are intrinsically vulnerable to various jamming attacks. The recently released 802.11ac protocol standardizes beam forming which is susceptible to new types of jamming attacks. We summarize those attacks and provide a proo
Publikováno v:
SIGSIM-PADS
Simulation and emulation techniques are commonly used to evaluate the performance of complex networked systems. Simulation conveniently predicts the behavior of a complex networked system while usually requiring fewer simplifying model assumptions of