Sciweavers

8503 search results - page 1584 / 1701
» Secure Software Architectures
Sort
View
SIGCOMM
2010
ACM
13 years 9 months ago
Caliper: a tool to generate precise and closed-loop traffic
Generating realistic and responsive traffic that reflects different network conditions is a challenging problem associated with performing valid experiments in network testbeds. I...
Monia Ghobadi, Martin Labrecque, Geoffrey Salmon, ...
SIGCOMM
2010
ACM
13 years 9 months ago
Ripcord: a modular platform for data center networking
In this demo, we present Ripcord, a modular platform for rapidly prototyping scale-out data center networks. Ripcord enables researchers to build and evaluate new network features...
Brandon Heller, David Erickson, Nick McKeown, Rean...
SIGCOMM
2010
ACM
13 years 9 months ago
QuagFlow: partnering Quagga with OpenFlow
Computing history has shown that open, multi-layer hardware and software stacks encourage innovation and bring costs down. Only recently this trend is meeting the networking world...
Marcelo Ribeiro Nascimento, Christian Esteve Rothe...
ICDCSW
2007
IEEE
13 years 9 months ago
A Middleware Support for Agent-Based Application Mobility in Pervasive Environments
—Application mobility is an efficient way to mask uneven conditioning and reduce users’ distractions in pervasive environments. However, since mobility brings more dynamism and...
Yu Zhou, Jiannong Cao, Vaskar Raychoudhury, Joanna...
CORR
2010
Springer
101views Education» more  CORR 2010»
13 years 9 months ago
Model-Driven Constraint Programming
Constraint programming can definitely be seen as a model-driven paradigm. The users write programs for modeling problems. These programs are mapped to executable models to calcula...
Raphaël Chenouard, Laurent Granvilliers, Rica...
« Prev « First page 1584 / 1701 Last » Next »