Sciweavers

2266 search results - page 373 / 454
» How Not to Evaluate a Developmental System
Sort
View
QEST
2006
IEEE
15 years 10 months ago
Optimization of Cache Expiration Dates in Content Networks
One of the fundamental decisions in content networks is how the information about the existing contents is deployed and accessed. In particular, in many content network architectu...
Héctor Cancela, Pablo Rodríguez-Bocc...
ACSAC
2005
IEEE
15 years 10 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson
ACSAC
2005
IEEE
15 years 10 months ago
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson’s famous Turing award lecture “Reflections on Trusting Trust,” showed that compilers can be subverted to insert maliciou...
David Wheeler
MICRO
2005
IEEE
107views Hardware» more  MICRO 2005»
15 years 10 months ago
Stream Programming on General-Purpose Processors
— In this paper we investigate mapping stream programs (i.e., programs written in a streaming style for streaming architectures such as Imagine and Raw) onto a general-purpose CP...
Jayanth Gummaraju, Mendel Rosenblum
ACMACE
2005
ACM
15 years 10 months ago
Fast delivery of game events with an optimistic synchronization mechanism in massive multiplayer online games
As smart players often win MMOG sessions by adopting frantic gaming strategies along the game evolution, also the system activities concerned with the distributed support of MMOGs...
Stefano Ferretti, Marco Roccetti