Sciweavers

330 search results - page 63 / 66
» Dynamics and Coding of a Biologically-Motivated Network
Sort
View
ICS
1999
Tsinghua U.
13 years 12 months ago
Improving the performance of bristled CC-NUMA systems using virtual channels and adaptivity
Current high-end parallel systems achieve low-latency, highbandwidth network communication through the use of aggressive design techniques and expensive mechanical and electrical ...
José F. Martínez, Josep Torrellas, J...
ACSAC
2008
IEEE
14 years 2 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
CODES
2007
IEEE
14 years 2 months ago
Predator: a predictable SDRAM memory controller
Memory requirements of intellectual property components (IP) in contemporary multi-processor systems-on-chip are increasing. Large high-speed external memories, such as DDR2 SDRAM...
Benny Akesson, Kees Goossens, Markus Ringhofer
TMM
2010
153views Management» more  TMM 2010»
13 years 2 months ago
Optimal Audio Transmission Over Error-Prone Wireless Links
In this paper, we present an optimization framework for transmitting high quality audio sequences over error-prone wireless links. Our framework introduces apparatus and technique ...
Ala F. Khalifeh, Homayoun Yousefi'zadeh
EUROSYS
2008
ACM
14 years 4 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos