Sciweavers

1675 search results - page 291 / 335
» Compositional Model-Based Design
Sort
View
PODC
1994
ACM
13 years 11 months ago
A Performance Evaluation of Lock-Free Synchronization Protocols
In this paper, we investigate the practical performance of lock-free techniques that provide synchronization on shared-memory multiprocessors. Our goal is to provide a technique t...
Anthony LaMarca
CONEXT
2007
ACM
13 years 11 months ago
Modeling the adoption of new network architectures
We propose an economic model based on user utility to study the adoption of new network architectures such as IPv6. We use mathematical analysis and simulation studies to understa...
Dilip Antony Joseph, Nikhil Shetty, John Chuang, I...
BROADNETS
2006
IEEE
13 years 11 months ago
On Traffic Grooming Choices for IP over WDM networks
Traffic grooming continues to be a rich area of research in the context of WDM optical networks. We provide an overview of the optical and electronic grooming techniques available...
Srivatsan Balasubramanian, Arun K. Somani
CHES
2006
Springer
88views Cryptology» more  CHES 2006»
13 years 11 months ago
Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage
Recent research has shown that cryptographers with glitches are vulnerable in front of Side Channel Attacks (SCA). Since then, several methods, such as Wave Dynamic Differential Lo...
Zhimin Chen, Yujie Zhou
CAMAD
2006
IEEE
13 years 11 months ago
Ensuring IP services consistency through lightweight monitoring-based admission control
Abstract-- This paper evaluates the performance of a distributed and lightweight AC model based on per-class edge-toedge monitoring feedback for ensuring the quality of multiple se...
Solange Rito Lima, Paulo Carvalho, Vasco Freitas