Sciweavers

858 search results - page 151 / 172
» One Is Enough!
Sort
View
DATE
2010
IEEE
190views Hardware» more  DATE 2010»
14 years 1 months ago
Ultra-high throughput string matching for Deep Packet Inspection
Deep Packet Inspection (DPI) involves searching a packet's header and payload against thousands of rules to detect possible attacks. The increase in Internet usage and growing...
Alan Kennedy, Xiaojun Wang, Zhen Liu, Bin Liu
NPIV
1999
ACM
142views Visualization» more  NPIV 1999»
14 years 1 months ago
ALMOST: Exploring Program Traces
We built a tool to visualize and explore program execution traces. Our goal was to help programmers without any prior knowledge of a program, quickly get enough knowledge about it...
Manos Reniers, Steven P. Reis
PODC
1999
ACM
14 years 1 months ago
Dynamically Configurable Distributed Objects
The dynamically configurable distributed object (DCDO) model helps enable object evolution and facilitate the development of distributed objects from multiple independent implemen...
Michael J. Lewis, Andrew S. Grimshaw
SIGUCCS
1999
ACM
14 years 1 months ago
Bridging Worlds: The IT Support Professional as Interpreter Between Cultures
One result of the action of Moore’s Law, the doubling of IT (Information Technology) power every 18 months, is a widening gap in the understanding of this technology between tho...
Don Rea
HPCA
1998
IEEE
14 years 1 months ago
Address Translation Mechanisms In Network Interfaces
Good network hardware performance is often squandered by overheads for accessing the network interface (NI) within a host. NIs that support user-level messaging avoid frequent ope...
Ioannis Schoinas, Mark D. Hill