Sciweavers

103 search results - page 12 / 21
» Crossbow: from hardware virtualized NICs to virtualized netw...
Sort
View
ASPDAC
2008
ACM
104views Hardware» more  ASPDAC 2008»
13 years 9 months ago
Low power clock buffer planning methodology in F-D placement for large scale circuit design
Traditionally, clock network layout is performed after cell placement. Such methodology is facing a serious problem in nanometer IC designs where people tend to use huge clock buff...
Yanfeng Wang, Qiang Zhou, Yici Cai, Jiang Hu, Xian...
TPDS
1998
73views more  TPDS 1998»
13 years 7 months ago
A Fully Adaptive Routing Algorithm for Dynamically Injured Hypercubes, Meshes, and Tori
—Unicast_V is a progressive, misrouting algorithm for packet or virtual cut-through networks. A progressive protocol forwards a message at an intermediate node if a nonfaulty pro...
Ming-Jer Tsai, Sheng-De Wang
WISTP
2010
Springer
14 years 2 months ago
Trust in Peer-to-Peer Content Distribution Protocols
Abstract. The distribution of virtual goods like multimedia data relies on the trustworthiness of the distribution system. Recent concepts for the distribution based on peer to pee...
Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs
ACSAC
2005
IEEE
14 years 1 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
MOBISYS
2005
ACM
14 years 7 months ago
Reincarnating PCs with portable SoulPads
The ability to walk up to any computer, personalize it, and use it as one's own has long been a goal of mobile computing research. We present SoulPad, a new approach based on...
Ramón Cáceres, Casey Carter, Chandra...