Sciweavers

372 search results - page 35 / 75
» On Codings of Traces
Sort
View
LISA
2008
15 years 6 months ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar
WWW
2006
ACM
16 years 4 months ago
WAP5: black-box performance debugging for wide-area systems
Wide-area distributed applications are challenging to debug, optimize, and maintain. We present Wide-Area Project 5 (WAP5), which aims to make these tasks easier by exposing the c...
Patrick Reynolds, Janet L. Wiener, Jeffrey C. Mogu...
JGTOOLS
2006
107views more  JGTOOLS 2006»
15 years 3 months ago
Efficient Shadows for Sampled Environment Maps
This paper addresses the problem of efficiently calculating shadows from environment maps in the context of ray-tracing. Since accurate rendering of shadows from environment maps ...
Aner Ben-Artzi, Ravi Ramamoorthi, Maneesh Agrawala
MICRO
2000
IEEE
72views Hardware» more  MICRO 2000»
15 years 3 months ago
PipeRench implementation of the instruction path coprocessor
This paper demonstrates how an Instruction Path Coprocessor (I-COP) can be efficiently implemented using the PipeRench reconfigurable architecture. An I-COP is a programmable on-c...
Yuan C. Chou, Pazhani Pillai, Herman Schmit, John ...
IMC
2005
ACM
15 years 9 months ago
An Information-theoretic Approach to Network Monitoring and Measurement
Network engineers and operators are faced with a number of challenges that arise in the context of network monitoring and measurement. These include: i) how much information is in...
Yong Liu, Donald F. Towsley, Tao Ye, Jean-Chrysost...