Sciweavers

6518 search results - page 1265 / 1304
» Distributed Individual-Based Simulation
Sort
View
USENIX
2008
13 years 12 months ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
ANCS
2008
ACM
13 years 11 months ago
Packet prediction for speculative cut-through switching
The amount of intelligent packet processing in an Ethernet switch continues to grow, in order to support of embedded applications such as network security, load balancing and qual...
Paul Congdon, Matthew Farrens, Prasant Mohapatra
ANCS
2008
ACM
13 years 11 months ago
On design of bandwidth scheduling algorithms for multiple data transfers in dedicated networks
The significance of high-performance dedicated networks has been well recognized due to the rapidly increasing number of large-scale applications that require high-speed data tran...
Yunyue Lin, Qishi Wu
APSCC
2008
IEEE
13 years 11 months ago
ABSRP- A Service Discovery Approach for Vehicular Ad Hoc Networks
A vehicular ad-hoc network (VANET) is a network of intelligent vehicles that communicate with other vehicles in the network. The main objective of VANET is to provide comfort and ...
Brijesh Kadri Mohandas, Amiya Nayak, Kshirasagar N...
GLVLSI
2010
IEEE
190views VLSI» more  GLVLSI 2010»
13 years 11 months ago
A linear statistical analysis for full-chip leakage power with spatial correlation
In this paper, we present an approved linear-time algorithm for statistical leakage analysis in the present of any spatial correlation condition (strong or weak). The new algorith...
Ruijing Shen, Sheldon X.-D. Tan, Jinjun Xiong
« Prev « First page 1265 / 1304 Last » Next »