Sciweavers

329 search results - page 66 / 66
» Source Routing and Scheduling in Packet Networks
Sort
View
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
13 years 5 months ago
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique
Spam is increasingly accepted as a problem associated with compromised hosts or email accounts. This problem not only makes the tracking of spam sources difficult but also enables ...
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fa...
NOCS
2010
IEEE
13 years 5 months ago
Asynchronous Bypass Channels: Improving Performance for Multi-synchronous NoCs
Abstract--Networks-on-Chip (NoC) have emerged as a replacement for traditional shared-bus designs for on-chip communications. As with all current VLSI designs, however, reducing po...
Tushar N. K. Jain, Paul V. Gratz, Alexander Sprint...
SIGMETRICS
2009
ACM
157views Hardware» more  SIGMETRICS 2009»
14 years 1 months ago
Delay tolerant bulk data transfers on the internet
Many emerging scientific and industrial applications require transferring multiple Tbytes of data on a daily basis. Examples include pushing scientific data from particle accele...
Nikolaos Laoutaris, Georgios Smaragdakis, Pablo Ro...
AGP
2010
IEEE
14 years 14 days ago
Constraint Logic Programming
Constraint Logic Programming (CLP) is one of the most successful branches of Logic Programming; it attracts the interest of theoreticians and practitioners, and it is currently use...
Marco Gavanelli, Francesca Rossi