Sciweavers

183 search results - page 21 / 37
» Analysis of manufacturing blocking systems with Network Calc...
Sort
View
INFOCOM
2012
IEEE
11 years 9 months ago
Extensive analysis and large-scale empirical evaluation of tor bridge discovery
Abstract—Tor is a well-known low-latency anonymous communication system that is able to bypass Internet censorship. However, publicly announced Tor routers are being blocked by v...
Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen ...
ICMCS
2005
IEEE
75views Multimedia» more  ICMCS 2005»
14 years 29 days ago
Optimizing Prefetch in a Residential Gateway with Networked Storage Systems
VOD services require the storage system support with multiple disks. SCSI-based systems are usual choices. However, disks can be attached directly to networks these days. Fiber Ch...
Eunsam Kim, Jonathan C. L. Liu
AINA
2006
IEEE
14 years 1 months ago
On Performance of Parallel iSCSI Protocol for Networked Storage Systems
: A newly emerging protocol for storage networking, iSCSI [1,2], was recently ratified by the Internet Engineering Task Force [3]. The iSCSI protocol is perceived as a low cost alt...
Qing (Ken) Yang
JSAC
2006
163views more  JSAC 2006»
13 years 7 months ago
Fast and Scalable Pattern Matching for Network Intrusion Detection Systems
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to detect predefined keywords or signatures in the packets....
Sarang Dharmapurikar, John W. Lockwood
PEPM
2009
ACM
15 years 7 months ago
Static Consistency Checking for Verilog Wire Interconnects
The Verilog hardware description language has padding semantics that allow designers to write descriptions where wires of different bit widths can be interconnected. However, many ...
Cherif Salama, Gregory Malecha, Walid Taha, Jim Gr...