Sciweavers

372 search results - page 35 / 75
» On Codings of Traces
Sort
View
LISA
2008
13 years 10 months ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar
WWW
2006
ACM
14 years 8 months ago
WAP5: black-box performance debugging for wide-area systems
Wide-area distributed applications are challenging to debug, optimize, and maintain. We present Wide-Area Project 5 (WAP5), which aims to make these tasks easier by exposing the c...
Patrick Reynolds, Janet L. Wiener, Jeffrey C. Mogu...
JGTOOLS
2006
107views more  JGTOOLS 2006»
13 years 7 months ago
Efficient Shadows for Sampled Environment Maps
This paper addresses the problem of efficiently calculating shadows from environment maps in the context of ray-tracing. Since accurate rendering of shadows from environment maps ...
Aner Ben-Artzi, Ravi Ramamoorthi, Maneesh Agrawala
MICRO
2000
IEEE
72views Hardware» more  MICRO 2000»
13 years 7 months ago
PipeRench implementation of the instruction path coprocessor
This paper demonstrates how an Instruction Path Coprocessor (I-COP) can be efficiently implemented using the PipeRench reconfigurable architecture. An I-COP is a programmable on-c...
Yuan C. Chou, Pazhani Pillai, Herman Schmit, John ...
IMC
2005
ACM
14 years 1 months ago
An Information-theoretic Approach to Network Monitoring and Measurement
Network engineers and operators are faced with a number of challenges that arise in the context of network monitoring and measurement. These include: i) how much information is in...
Yong Liu, Donald F. Towsley, Tao Ye, Jean-Chrysost...