Sciweavers

451 search results - page 32 / 91
» Maintainability of the Linux kernel
Sort
View
SIGCOMM
2005
ACM
14 years 1 months ago
A DoS-limiting network architecture
We present the design and evaluation of TVA, a network architecture that limits the impact of Denial of Service (DoS) floods from the outset. Our work builds on earlier work on c...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
EUROCRYPT
2006
Springer
13 years 11 months ago
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Abstract. This paper studies the gaps that exist between cryptography as studied in theory, as defined in standards, as implemented by software engineers, and as actually consumed ...
Kenneth G. Paterson, Arnold K. L. Yau
CVPR
2008
IEEE
14 years 9 months ago
Robust dual motion deblurring
This paper presents a robust algorithm to deblur two consecutively captured blurred photos from camera shaking. Previous dual motion deblurring algorithms succeeded in small and s...
Jia Chen, Lu Yuan, Chi-Keung Tang, Long Quan
ECRTS
2007
IEEE
14 years 2 months ago
Integrating Hard/Soft Real-Time Tasks and Best-Effort Jobs on Multiprocessors
We present a multiprocessor scheduling framework for integrating hard and soft real-time tasks and best-effort jobs. This framework allows for full system utilization, and ensures...
Björn B. Brandenburg, James H. Anderson
CBSE
2006
Springer
13 years 11 months ago
Impact of Virtual Memory Managers on Performance of J2EE Applications
We investigate the impact of Operating System's Virtual Memory Managers (VMMs) on performance of enterprise applications. By taking various popular branches of the Linux kerne...
Alexander Ufimtsev, Alena Kucharenka, Liam Murphy