Sciweavers

282 search results - page 43 / 57
» Private Policy Negotiation
Sort
View
PET
2007
Springer
14 years 1 months ago
Identity Trail: Covert Surveillance Using DNS
Abstract. The Domain Name System (DNS) is the only globally deployed Internet service that provides user-friendly naming for Internet hosts. It was originally designed to return th...
Saikat Guha, Paul Francis
SIGARCH
2008
97views more  SIGARCH 2008»
13 years 7 months ago
SP-NUCA: a cost effective dynamic non-uniform cache architecture
1 This paper presents a simple but effective method to reduce on-chip access latency and improve core isolation in CMP Non-Uniform Cache Architectures (NUCA). The paper introduces ...
Javier Merino, Valentin Puente, Pablo Prieto, Jos&...
MICRO
2006
IEEE
102views Hardware» more  MICRO 2006»
14 years 1 months ago
Managing Distributed, Shared L2 Caches through OS-Level Page Allocation
This paper presents and studies a distributed L2 cache management approach through OS-level page allocation for future many-core processors. L2 cache management is a crucial multi...
Sangyeun Cho, Lei Jin
SIGCOMM
2006
ACM
14 years 1 months ago
Policy-based routing with non-strict preferences
Traditional studies of routing problems often assumed strict preferences on paths, by eliminating ambiguity in path comparisons, or imposing a priori deterministic tie-breaking. S...
Chi-kin Chau
DANCE
2002
IEEE
14 years 10 days ago
The RadioActive Networking Architecture
This paper describes the activities in Application Level Active Networks (ALAN) under the DARPA-funded RADIOACTIVE Project; this is closely related to work carried out under a Eur...
Peter T. Kirstein, Piers O'Hanlon, Ken Carlberg, P...