Sciweavers

516 search results - page 68 / 104
» Execution replay and debugging
Sort
View
CSFW
2007
IEEE
14 years 3 months ago
Security Analysis of Voice-over-IP Protocols
The transmission of voice communications as datagram packets over IP networks, commonly known as Voice-overIP (VoIP) telephony, is rapidly gaining wide acceptance. With private ph...
Prateek Gupta, Vitaly Shmatikov
ISCA
2007
IEEE
110views Hardware» more  ISCA 2007»
14 years 3 months ago
Late-binding: enabling unordered load-store queues
Conventional load/store queues (LSQs) are an impediment to both power-efficient execution in superscalar processors and scaling to large-window designs. In this paper, we propose...
Simha Sethumadhavan, Franziska Roesner, Joel S. Em...
CSFW
2002
IEEE
14 years 1 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
ICS
2009
Tsinghua U.
14 years 1 months ago
Exploring pattern-aware routing in generalized fat tree networks
New static source routing algorithms for High Performance Computing (HPC) are presented in this work. The target parallel architectures are based on the commonly used fattree netw...
Germán Rodríguez, Ramón Beivi...
SIGMETRICS
1997
ACM
14 years 1 months ago
File System Aging - Increasing the Relevance of File System Benchmarks
Benchmarks are important because they provide a means for users and researchers to characterize how their workloads will perform on different systems and different system architec...
Keith A. Smith, Margo I. Seltzer