Sciweavers

2795 search results - page 496 / 559
» Recommended or Not
Sort
View
ICPADS
2006
IEEE
14 years 1 months ago
The Impact of Information Availability and Workload Characteristics on the Performance of Job Co-allocation in Multi-clusters
In this paper, we utilize a bandwidth-centric job communication model that captures the interaction and impact of simultaneously co-allocating jobs across multiple clusters. We ma...
William M. Jones, Walter B. Ligon III, Nishant Shr...
IPPS
2006
IEEE
14 years 1 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti
RTSS
2006
IEEE
14 years 1 months ago
Process-Aware Interrupt Scheduling and Accounting
In most operating systems, the handling of interrupts is typically performed within the address space of the kernel. Moreover, interrupt handlers are invoked asynchronously during...
Yuting Zhang, Richard West
VTC
2006
IEEE
147views Communications» more  VTC 2006»
14 years 1 months ago
Performance Analysis of Scheduling Algorithms for VoIP Services in IEEE 802.16e Systems
There are several scheduling algorithms for Voice over IP (VoIP) services in IEEE 802.16e systems, such as unsolicited grant service (UGS), real-time polling service (rtPS), and ex...
Howon Lee, Taesoo Kwon, Dong-Ho Cho, Geunhwi Lim, ...
ACNS
2006
Springer
117views Cryptology» more  ACNS 2006»
14 years 1 months ago
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
We study the influence of collision-finding attacks on the security of time-stamping schemes. We distinguish between client-side hash functions used to shorten the documents befo...
Ahto Buldas, Sven Laur