Sciweavers

460 search results - page 66 / 92
» Limits of Control Flow on Parallelism
Sort
View
NETWORK
2008
106views more  NETWORK 2008»
13 years 8 months ago
Toward internet-wide multipath routing
The Internet would be more efficient and robust if routers could flexibly divide traffic over multiple paths. Often, having one or two extra paths is sufficient for customizing pa...
Jiayue He, Jennifer Rexford
WEA
2010
Springer
311views Algorithms» more  WEA 2010»
13 years 6 months ago
Realtime Classification for Encrypted Traffic
Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and tr...
Roni Bar-Yanai, Michael Langberg, David Peleg, Lia...
WISTP
2010
Springer
13 years 6 months ago
Efficient and Effective Buffer Overflow Protection on ARM Processors
Although many countermeasures have been developed for desktop and server environments, buffer overflows still pose a big threat. The same approach can be used to target mobile devi...
Raoul Strackx, Yves Younan, Pieter Philippaerts, F...
ICEBE
2009
IEEE
118views Business» more  ICEBE 2009»
13 years 6 months ago
Temporal Exception Prediction for Loops in Resource Constrained Concurrent Workflows
Workflow management systems (WfMS) are widely used for improving business processes and providing better quality of services. However, rapid changes in business environment can ca...
Iok-Fai Leong, Yain-Whar Si
SI3D
1995
ACM
14 years 5 days ago
Real-Time Programmable Shading
One of the main techniques used by software renderers to produce stunningly realistic images is programmable shading—executing an arbitrarily complex program to compute the colo...
Anselmo Lastra, Steven Molnar, Marc Olano, Yulan W...