Sciweavers

988 search results - page 190 / 198
» A Network Service Access Control Framework Based on Network ...
Sort
View
WSC
1997
13 years 9 months ago
A Hybrid Tool for the Performance Evaluation of NUMA Architectures
We present a system for describing and solving closed queuing network models of the memory access performance of NUMA architectures. The system consists of a model description lan...
James Westall, Robert Geist
IUI
2011
ACM
12 years 10 months ago
Groups without tears: mining social topologies from email
As people accumulate hundreds of “friends” in social media, a flat list of connections becomes unmanageable. Interfaces agnostic to social structure hinder the nuanced sharin...
Diana MacLean, Sudheendra Hangal, Seng Keat Teh, M...
SIGUCCS
2003
ACM
14 years 27 days ago
Regaining single sign-on taming the beast
It has been our effort at Ringling school to provide our campus community with the capability to uniformly access resources across multiple platforms. Empowering the user with a s...
Divyangi Anchan, Mahmoud Pegah
ESORICS
2009
Springer
14 years 8 months ago
Data Structures with Unpredictable Timing
Abstract. A range of attacks on network components, such as algorithmic denial-of-service attacks and cryptanalysis via timing attacks, are enabled by data structures for which an ...
Darrell Bethea, Michael K. Reiter
IMC
2010
ACM
13 years 5 months ago
Eyeball ASes: from geography to connectivity
This paper presents a new approach to determine the geographical footprint of individual Autonomous Systems that directly provide service to end-users, i.e.,eyeball ASes. The key ...
Amir H. Rasti, Nazanin Magharei, Reza Rejaie, Walt...