Sciweavers

7587 search results - page 1354 / 1518
» Network Analysis and Visualisation
Sort
View
SAC
2006
ACM
14 years 2 months ago
Building the functional performance model of a processor
In this paper, we present an efficient procedure for building a piecewise linear function approximation of the speed function of a processor with hierarchical memory structure. Th...
Alexey L. Lastovetsky, Ravi Reddy, Robert Higgins
SIGECOM
2006
ACM
138views ECommerce» more  SIGECOM 2006»
14 years 2 months ago
Bid expressiveness and clearing algorithms in multiattribute double auctions
We investigate the space of two-sided multiattribute auctions, focusing on the relationship between constraints on the offers traders can express through bids, and the resulting c...
Yagil Engel, Michael P. Wellman, Kevin M. Lochner
SIGMETRICS
2006
ACM
128views Hardware» more  SIGMETRICS 2006»
14 years 2 months ago
Partially overlapped channels not considered harmful
Many wireless channels in different technologies are known to have partial overlap. However, due to the interference effects among such partially overlapped channels, their simult...
Arunesh Mishra, Vivek Shrivastava, Suman Banerjee,...
SWS
2006
ACM
14 years 2 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
ACSAC
2005
IEEE
14 years 1 months ago
TARP: Ticket-based Address Resolution Protocol
IP networks fundamentally rely on the Address Resolution Protocol (ARP) for proper operation. Unfortunately, vulnerabilities in the ARP protocol enable a raft of IP-based imperson...
Wesam Lootah, William Enck, Patrick McDaniel
« Prev « First page 1354 / 1518 Last » Next »