Sciweavers

1000 search results - page 133 / 200
» SR-IOV Networking in Xen: Architecture, Design and Implement...
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
SOSP
2001
ACM
14 years 5 months ago
Building a Robust Software-Based Router Using Network Processors
Recent efforts to add new services to the Internet have increased interest in software-based routers that are easy to extend and evolve. This paper describes our experiences using...
Tammo Spalink, Scott Karlin, Larry L. Peterson, Yi...
DFT
2003
IEEE
132views VLSI» more  DFT 2003»
14 years 1 months ago
Level-Hybrid Optoelectronic TESH Interconnection Network
This paper discusses a hybrid optoelectronic scheme for a new interconnection network, "Tori connected mESHes (TESH)". The major features of TESH are the following: it i...
Vijay K. Jain, Glenn H. Chapman
EDO
2006
Springer
13 years 11 months ago
Damon: a decentralized aspect middleware built on top of a peer-to-peer overlay network
In this paper we present Damon, a decentralized wide-area runtime aspect middleware built on top of a structured peer-topeer (p2p) substrate and a dynamic Aspect Oriented Programm...
Rubén Mondéjar, Pedro García ...
ATAL
2007
Springer
13 years 10 months ago
InterPol: a policy framework for managing trust and privacy in referral networks
Referral networks are a kind of P2P system consisting of autonomous agents who seek, provide services, or refer other service providers. Key applications include service discovery...
Yathiraj B. Udupi, Munindar P. Singh