Sciweavers

673 search results - page 84 / 135
» Request behavior variations
Sort
View
ERSA
2003
137views Hardware» more  ERSA 2003»
13 years 9 months ago
Next Generation Architecture for Heterogeneous Embedded Systems
The Software Communications Architecture (SCA), a mandatory specification for Software Radio implementations by the Joint Tactical Radio System (JTRS), defines a Common Object R...
S. Murat Bicer, Frank Pilhofer, Graham Bardouleau,...
GLOBECOM
2008
IEEE
13 years 8 months ago
Evaluating P2PSIP under Attack: An Emulative Study
— Recently, establishing a VoIP call using a P2P network instead of regular SIP-servers has been proposed; this novel approach to SIP-signaling is commonly referred to as P2PSIP ...
Jan Seedorf, Frank Ruwolt, Martin Stiemerling, Sav...
TOCS
2008
154views more  TOCS 2008»
13 years 7 months ago
Adaptive work-stealing with parallelism feedback
We present an adaptive work-stealing thread scheduler, ASTEAL, for fork-join multithreaded jobs, like those written using the Cilk multithreaded language or the Hood work-stealing...
Kunal Agrawal, Charles E. Leiserson, Yuxiong He, W...
JNCA
2007
125views more  JNCA 2007»
13 years 7 months ago
Distributed middleware architectures for scalable media services
The fusion of Multimedia and Internet technology has introduced an ever-increasing demand for large-scale reliable media services. This exposes the scalability limitations of curr...
Vana Kalogeraki, Demetrios Zeinalipour-Yazti, Dimi...
PERCOM
2011
ACM
12 years 11 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...