Sciweavers

103 search results - page 17 / 21
» Crossbow: from hardware virtualized NICs to virtualized netw...
Sort
View
EUROSYS
2006
ACM
14 years 4 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
SIGMETRICS
2004
ACM
106views Hardware» more  SIGMETRICS 2004»
14 years 24 days ago
Quantifying trade-offs in resource allocation for VPNs
Virtual Private Networks (VPNs) feature notable characteristics in structure and traffic patterns that allow for efficient resource allocation. A strategy that exploits the underl...
Satish Raghunath, Shivkumar Kalyanaraman, K. K. Ra...
DSD
2009
IEEE
118views Hardware» more  DSD 2009»
14 years 2 months ago
Internet-Router Buffered Crossbars Based on Networks on Chip
—The scalability and performance of the Internet depends critically on the performance of its packet switches. Current packet switches are based on single-hop crossbar fabrics, w...
Kees Goossens, Lotfi Mhamdi, Iria Varela Senin
MICRO
2002
IEEE
156views Hardware» more  MICRO 2002»
13 years 7 months ago
TCP Switching: Exposing Circuits to IP
There has been much discussion about the best way to combine the benefits of new optical circuit switching technology with the established packet switched Internet. In this paper,...
Pablo Molinero-Fernández, Nick McKeown
MM
2003
ACM
133views Multimedia» more  MM 2003»
14 years 19 days ago
Real-time compression for dynamic 3D environments
The goal of tele-immersion has long been to enable people at remote locations to share a sense of presence. A tele-immersion system acquires the 3D representation of a collaborato...
Sang-Uok Kum, Ketan Mayer-Patel, Henry Fuchs