Sciweavers

8493 search results - page 1618 / 1699
» Implementing a distributed firewall
Sort
View
PLDI
2003
ACM
14 years 3 months ago
Checking and inferring local non-aliasing
In prior work [15] we studied a language construct restrict that allows programmers to specify that certain pointers are not aliased to other pointers used within a lexical scope....
Alexander Aiken, Jeffrey S. Foster, John Kodumal, ...
PLDI
2003
ACM
14 years 3 months ago
Linear analysis and optimization of stream programs
As more complex DSP algorithms are realized in practice, an increasing need for high-level stream abstractions that can be compiled without sacrificing efficiency. Toward this en...
Andrew A. Lamb, William Thies, Saman P. Amarasingh...
SASN
2003
ACM
14 years 3 months ago
Secure multicast groups on ad hoc networks
In this paper we address the problem of secure multicast of data streams over a multihop wireless ad hoc network. We propose a dynamic multicast group management protocol that aim...
Tansel Kaya, Guolong Lin, Guevara Noubir, A. Yilma...
SIGCOMM
2003
ACM
14 years 3 months ago
Scaling internet routers using optics
Routers built around a single-stage crossbar and a centralized scheduler do not scale, and (in practice) do not provide the throughput guarantees that network operators need to ma...
Isaac Keslassy, Shang-Tse Chuang, Kyoungsik Yu, Da...
SMA
2003
ACM
138views Solid Modeling» more  SMA 2003»
14 years 3 months ago
Associativity between feature models across domains
Associativity between feature models implies the automatic updating of different feature models of a part after changes are made in one of its feature models. This is an importan...
S. Subramani, Balan Gurumoorthy
« Prev « First page 1618 / 1699 Last » Next »