Sciweavers

2747 search results - page 370 / 550
» Network externalities in software systems
Sort
View
HOTI
2005
IEEE
14 years 3 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
ICW
2005
IEEE
178views Communications» more  ICW 2005»
14 years 3 months ago
Adding Multi-Class Routing into the DiffServ Architecture
- To alleviate the problem of high priority traffic hogging of all the available network capacity and to optimize the network traffic in the DiffServ network, we introduce the mult...
Yin Wang, Raimo Kantola, Shuping Liu
ISCA
2005
IEEE
135views Hardware» more  ISCA 2005»
14 years 3 months ago
Deconstructing Commodity Storage Clusters
The traditional approach for characterizing complex systems is to run standard workloads and measure the resulting performance as seen by the end user. However, unique opportuniti...
Haryadi S. Gunawi, Nitin Agrawal, Andrea C. Arpaci...
ICCAD
2000
IEEE
115views Hardware» more  ICCAD 2000»
14 years 2 months ago
Challenges and Opportunities in Broadband and Wireless Communication Designs
Communication designs form the fastest growing segment of the semiconductor market. Both network processors and wireless chipsets have been attracting a great deal of research att...
Jan M. Rabaey, Miodrag Potkonjak, Farinaz Koushanf...
WWW
2011
ACM
13 years 5 months ago
The design and usage of tentative events for time-based social coordination in the enterprise
Existing enterprise calendaring systems have suffered from problems like rigidity, lack of transparency, and poor integration with social networks. We present the system design an...
Mikhil Masli, Werner Geyer, Casey Dugan, Beth Brow...