Sciweavers

7741 search results - page 1393 / 1549
» Security in Active Networks
Sort
View
ISPD
2004
ACM
146views Hardware» more  ISPD 2004»
15 years 10 months ago
Power-aware clock tree planning
Modern processors and SoCs require the adoption of poweroriented design styles, due to the implications that power consumption may have on reliability, cost and manufacturability ...
Monica Donno, Enrico Macii, Luca Mazzoni
ACMICEC
2003
ACM
118views ECommerce» more  ACMICEC 2003»
15 years 10 months ago
Visualization of EDI messages: facing the problems in the use of XML
Multi-organizational EDI message networks are complicated communication environments with various standards and technologies. The role of third party message exchange hubs has bec...
Reija Korhonen, Airi Salminen
ISORC
2002
IEEE
15 years 9 months ago
End-to-End Latency of a Fault-Tolerant CORBA Infrastructure
This paper presents measured probability density functions (pdfs) for the end-to-end latency of two-way remote method invocations from a CORBA client to a replicated CORBA server ...
Wenbing Zhao, Louise E. Moser, P. M. Melliar-Smith
FUN
2010
Springer
263views Algorithms» more  FUN 2010»
15 years 9 months ago
Fighting Censorship with Algorithms
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
Mohammad Mahdian
PADS
1999
ACM
15 years 9 months ago
Shock Resistant Time Warp
In an attempt to cope with time-varying workload, traditional adaptive Time Warp protocols are designed to react in response to performance changes by altering control parameter c...
Alois Ferscha, James Johnson
« Prev « First page 1393 / 1549 Last » Next »