Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

1,536 Full-Text Articles 2,226 Authors 983,551 Downloads 129 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

1,536 full-text articles. Page 63 of 63.

The Changing Patterns Of Internet Usage, Christopher S. Yoo 2010 University of Pennsylvania Carey Law School

The Changing Patterns Of Internet Usage, Christopher S. Yoo

Faculty Scholarship at Penn Carey Law

The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might be …


Application Planning, Jochen Albrecht, Clare Davies 2010 CUNY Hunter College

Application Planning, Jochen Albrecht, Clare Davies

Publications and Research

No abstract provided.


Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo 2010 University of Pennsylvania Carey Law School

Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo

Faculty Scholarship at Penn Carey Law

The current debate over broadband policy has largely overlooked a number of changes to the architecture of the Internet that have caused the price paid by and quality of service received by traffic traveling across the Internet to vary widely. Topological innovations, such as private peering, multihoming, secondary peering, server farms, and content delivery networks, have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Moreover, network providers have begun to employ an increasingly varied array of business arrangements. Some of these innovations are responses to the growing importance of peer-to-peer technologies. Others, such …


Transmitter Optimization In Multiuser Wireless Systems With Quality Of Service Constraints, Danda B. Rawat 2010 Old Dominion University

Transmitter Optimization In Multiuser Wireless Systems With Quality Of Service Constraints, Danda B. Rawat

Electrical & Computer Engineering Theses & Dissertations

In this dissertation, transmitter adaptation for optimal resource allocation in wireless communication systems are investigated. First, a multiple access channel model is considered where many transmitters communicate with a single receiver. This scenario is a basic component of a. wireless network in which multiple users simultaneously access the resources of a wireless service provider. Adaptive algorithms for transmitter optimization to meet Quality-of-Service (QoS) requirements in a distributed manner are studied. Second, an interference channel model is considered where multiple interfering transmitter-receiver pairs co-exist such that a given transmitter communicates with its intended receiver in the presence of interference from other …


Defending Privacy: The Development And Deployment Of A Darknet, Conor McManamon, Fredrick Mtenzi 2010 Technological University Dublin

Defending Privacy: The Development And Deployment Of A Darknet, Conor Mcmanamon, Fredrick Mtenzi

Conference papers

New measures imposed by governments, Internet service providers and other third parties which threaten the state of privacy are also opening new avenues to protecting it. The unwarranted scrutiny of legitimate services such as file hosters and the BitTorrent protocol, once relatively unknown to the casual Internet user, is becoming more obvious. The darknet is a rising contender against these new measures and will preserve the default right to privacy of Internet users. A darknet is defined in the context of file sharing as a network which operates on top of another network such as the Internet for the purpose …


Embedded Systems As Datacenters, Robert Iannucci 2009 RAI Laboratory LLC

Embedded Systems As Datacenters, Robert Iannucci

Robert A Iannucci

No abstract provided.


Using A Majority Voting Hardware Method On Weather Information To Increase The Accuracy Of Decision Making Methods, Sanaz Asadinia 2009 University of Arak,Iran

Using A Majority Voting Hardware Method On Weather Information To Increase The Accuracy Of Decision Making Methods, Sanaz Asadinia

Sanaz Asadinia

No abstract provided.


A Hybrid Routing Algorithm Based On Ant Colony And Zhls Routing Protocol For Manet, Marjan Rafsanjani, Sanaz Asadinia, Farzaneh Pakzad 2009 University of Arak,Iran

A Hybrid Routing Algorithm Based On Ant Colony And Zhls Routing Protocol For Manet, Marjan Rafsanjani, Sanaz Asadinia, Farzaneh Pakzad

Sanaz Asadinia

Mobile Ad hoc networks (MANETs) require dynamic routing schemes for adequate performance. This paper, presents a new routing algorithm for MANETs, which combines the idea of ant colony optimization with Zone-based Hierarchical Link State (ZHLS) protocol. Ant colony optimization (ACO) is a class of Swarm Intelligence (SI) algorithms. SI is the local interaction of many simple agents to achieve a global goal. SI is based on social insect for solving different types of problems. ACO algorithm uses mobile agents called ants to explore network. Ants help to find paths between two nodes in the network. Our algorithm is based on …


Upper Bounds On The Number Of Channels To Ensure Collision-Free Communications In Multi-Channel Wireless Networks Using Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu 2009 Macau University of Science and Technology

Upper Bounds On The Number Of Channels To Ensure Collision-Free Communications In Multi-Channel Wireless Networks Using Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu

Hong-Ning Dai

Recent studies have found that using multiple channels can separate concurrent transmissions and significantly improve network throughput. However, these studies have only considered wireless nodes that are equipped with omni-directional antennas, which have high interference. On the other hand, other researchers have found that using directional antennas in wireless networks can reduce interference and improve the network performance. But their studies have only considered single channel to be used in wireless networks with directional antennas. Thus, integrating the two technologies of multiple channels and directional antennas together can potentially bring more benefits. Some previous works have studies the capacity on …


Forensic Analysis Of A Playstation 3 Console, Scott Conrad, Greg Dorn, Philip Craiger 2009 University of Central Florida

Forensic Analysis Of A Playstation 3 Console, Scott Conrad, Greg Dorn, Philip Craiger

J. Philip Craiger, Ph.D.

The Sony PlayStation 3 (PS3) is a powerful gaming console that supports Internet-related activities, local file storage and the playing of Blu-ray movies. The PS3 also allows users to partition and install a secondary operating system on the hard drive. This “desktop-like” functionality along with the encryption of the primary hard drive containing the gaming software raises significant issues related to the forensic analysis of PS3 systems. This paper discusses the PS3 architecture and behavior, and provides recommendations for conducting forensic investigations of PS3 systems.


Digital Commons powered by bepress