Sciweavers

38 search results - page 7 / 8
» Laboratory-based calibration of available bandwidth estimati...
Sort
View
ISCA
2009
IEEE
186views Hardware» more  ISCA 2009»
14 years 3 months ago
Application-aware deadlock-free oblivious routing
Conventional oblivious routing algorithms are either not application-aware or assume that each flow has its own private channel to ensure deadlock avoidance. We present a framewo...
Michel A. Kinsy, Myong Hyon Cho, Tina Wen, G. Edwa...
PAM
2005
Springer
14 years 2 months ago
Using Simple Per-Hop Capacity Metrics to Discover Link Layer Network Topology
At present, link layer topology discovery methodologies rely on protocols that are not universally available, such as SNMP. Such methodologies can only be applied to a subset of al...
Shane Alcock, Anthony McGregor, Richard Nelson
TCOS
2010
13 years 3 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...
BMCBI
2004
127views more  BMCBI 2004»
13 years 8 months ago
Optimized LOWESS normalization parameter selection for DNA microarray data
Background: Microarray data normalization is an important step for obtaining data that are reliable and usable for subsequent analysis. One of the most commonly utilized normaliza...
John A. Berger, Sampsa Hautaniemi, Anna-Kaarina J&...
CISIS
2007
IEEE
14 years 3 months ago
Obtaining Performance Measures through Microbenchmarking in a Peer-to-Peer Overlay Computer
: The availability of enormous amounts of un-used computing power and data storage over the In-ternet makes the development of a globally distributed computing platform, called Ove...
Paolo Bertasi, Mauro Bianco, Andrea Pietracaprina,...