Sciweavers

451 search results - page 28 / 91
» Maintainability of the Linux kernel
Sort
View
CONEXT
2008
ACM
13 years 9 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
ICEIS
2005
IEEE
14 years 1 months ago
Performing Real-Time Scheduling in an Interactive Audio-Streaming Application
: The CEDRIC and the IRCAM conduct since 2002 a project entitled "distributed orchestra" which proposes to coordinate on a network the actors of a musical orchestra (musi...
Julien Cordry, Nicolas Bouillot, Samia Bouzefrane
ICPPW
2002
IEEE
14 years 18 days ago
System Services for Implementing Ad-Hoc Routing Protocols
This paper explores several systems issues regarding the implementation of routing protocols for mobile ad-hoc networks. It proclaims that support for on-demand routing is insufï¬...
Vikas Kawadia, Yongguang Zhang, Binita Gupta
ICPPW
2009
IEEE
13 years 5 months ago
Characterizing the Performance of
Using Linux for high-performance applications on the compute nodes of IBM Blue Gene/P is challenging because of TLB misses and difficulties with programming the network DMA engine...
Kazutomo Yoshii, Kamil Iskra, Harish Naik, Pete Be...
SAC
2008
ACM
13 years 7 months ago
Frequent pattern mining for kernel trace data
Operating systems engineers have developed tracing tools that log details about process execution at the kernel level. These tools make it easier to understand the actual executio...
Christopher LaRosa, Li Xiong, Ken Mandelberg