Sciweavers

909 search results - page 164 / 182
» On the approximability of some network design problems
Sort
View
MICRO
2003
IEEE
109views Hardware» more  MICRO 2003»
14 years 20 days ago
TLC: Transmission Line Caches
It is widely accepted that the disproportionate scaling of transistor and conventional on-chip interconnect performance presents a major barrier to future high performance systems...
Bradford M. Beckmann, David A. Wood
CCR
2004
103views more  CCR 2004»
13 years 7 months ago
Reconsidering wireless systems with multiple radios
The tremendous popularity of wireless systems in recent years has led to the commoditization of RF transceivers (radios) whose prices have fallen dramatically. The lower cost allo...
Paramvir Bahl, Atul Adya, Jitendra Padhye, Alec Wo...
CCR
2004
151views more  CCR 2004»
13 years 7 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 23 days ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
PC
1998
140views Management» more  PC 1998»
13 years 7 months ago
A Framework for Structured Distributed Object Computing
This paper presents a four-faceted framework for distributed applications that use worldwide networks connecting large numbers of people, software tools, monitoring instruments, a...
K. Mani Chandy, Joseph Kiniry, Adam Rifkin, Daniel...