Sciweavers

625 search results - page 91 / 125
» Design and Implementation of a High-Performance Active Netwo...
Sort
View
OSDI
2004
ACM
14 years 9 months ago
Automated Worm Fingerprinting
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...
LCTRTS
2001
Springer
14 years 1 months ago
Middleware For Building Adaptive Systems Via Configuration
1 COTS (commercial off-the-shelf) devices are capable of executing powerful, distributed algorithms. Very large, adaptive systems can be created by simply integrating these devices...
Sanjai Narain, Ravichander Vaidyanathan, Stanley M...
CCS
2011
ACM
12 years 9 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
MOBISYS
2010
ACM
13 years 11 months ago
Improving energy efficiency of location sensing on smartphones
Location-based applications have become increasingly popular on smartphones over the past years. The active use of these applications can however cause device battery drain owing ...
Zhenyun Zhuang, Kyu-Han Kim, Jatinder Pal Singh
ICANN
2005
Springer
14 years 2 months ago
A Real-Time, FPGA Based, Biologically Plausible Neural Network Processor
Abstract. A real-time, large scale, leaky-integrate-and-fire neural network processor realized using FPGA is presented. This has been designed, as part of a collaborative project,...
Martin J. Pearson, Ian Gilhespy, Kevin N. Gurney, ...