Sciweavers

3116 search results - page 545 / 624
» Design and implementation of network puzzles
Sort
View
VLSID
2004
IEEE
107views VLSI» more  VLSID 2004»
16 years 4 months ago
Performance Analysis of Inter Cluster Communication Methods in VLIW Architecture
With increasing demands for high performance by embedded systems, especially by digital signal processing applications, embedded processors must increase available instruction lev...
Sourabh Saluja, Anshul Kumar
STOC
2003
ACM
133views Algorithms» more  STOC 2003»
16 years 4 months ago
A fast algorithm for computing steiner edge connectivity
Given an undirected graph or an Eulerian directed graph G and a subset S of its vertices, we show how to determine the edge connectivity C of the vertices in S in time O(C3 n log ...
Richard Cole, Ramesh Hariharan
OSDI
2002
ACM
16 years 4 months ago
Taming Aggressive Replication in the Pangaea Wide-Area File System
Pangaea is a wide-area file system that supports data sharing among a community of widely distributed users. It is built on a symmetrically decentralized infrastructure that consi...
Yasushi Saito, Christos T. Karamanolis, Magnus Kar...
ICSE
2003
IEEE-ACM
16 years 4 months ago
Pattern-Oriented Distributed System Architectures
ion. riented language features, such as abstract classes, inheritance, dynamic binding, and parameterized types. Middleware, such as object-oriented frameworks for host infrastruct...
Douglas C. Schmidt
ICDCS
2009
IEEE
16 years 1 months ago
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
Chia-Wei Chang, Seungjoon Lee, B. Lin, Jia Wang