Sciweavers

851 search results - page 148 / 171
» Network Effects and Technology Licensing
Sort
View
DISCEX
2003
IEEE
14 years 1 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
HPDC
2003
IEEE
14 years 1 months ago
The Ethernet Approach to Grid Computing
Despite many competitors, Ethernet became the dominant protocol for local area networking due to its simplicity, robustness, and efficiency in wide variety of conditions and tech...
Douglas Thain, Miron Livny
HT
2003
ACM
14 years 29 days ago
Browsing intricately interconnected paths
Graph-centric and node-centric browsing are the two commonly identified hypertext-browsing paradigms. We believe that pathcentric browsing, the browsing behavior exhibited by path...
Pratik Dave, Unmil Karadkar, Richard Furuta, Luis ...
ASPDAC
2009
ACM
159views Hardware» more  ASPDAC 2009»
14 years 12 days ago
Congestion-aware power grid optimization for 3D circuits using MIM and CMOS decoupling capacitors
— In three-dimensional (3D) chips, the amount of supply current per package pin is significantly more than in two-dimensional (2D) designs. Therefore, the power supply noise pro...
Pingqiang Zhou, Karthikk Sridharan, Sachin S. Sapa...
ANSS
2000
IEEE
14 years 4 days ago
An Analytic Method for Predicting Simulation Parallelism
The abilityto predict the performance of a simulationapplicationbefore its implementationis an important factor to the adoption of parallel simulation technology in industry. Idea...
Hong Wang, Yong Meng Teo, Seng Chuan Tay