Sciweavers

60 search results - page 3 / 12
» The Zero Latency Enterprise
Sort
View
NETWORKS
2008
13 years 7 months ago
Price competition with elastic traffic
In this paper, we present a combined study of price competition and traffic control in a congested network. We study a model in which service providers own the routes in a network...
Asuman E. Ozdaglar
JDA
2007
129views more  JDA 2007»
13 years 7 months ago
Approximating the k-traveling repairman problem with repairtimes
Given an undirected graph G = (V,E) and a source vertex s ∈ V , the k-traveling repairman (KTR) problem, also known as the minimum latency problem, asks for k tours, each starti...
Raja Jothi, Balaji Raghavachari
DAC
1996
ACM
13 years 11 months ago
Introspection: A Low Overhead Binding Technique During Self-Diagnosing Microarchitecture Synthesis
Abstract: Introspection, a zero-overhead binding technique during self-diagnosing microarchitecture synthesis is presented. Given a scheduled control data ow graph (CDFG) introspec...
Balakrishnan Iyer, Ramesh Karri
ACSAC
2007
IEEE
14 years 1 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
SIGMETRICS
1997
ACM
103views Hardware» more  SIGMETRICS 1997»
13 years 11 months ago
Performance Issues of Enterprise Level Web Proxies
Enterprise level web proxies relay world-wide web traffic between private networks and the Internet. They improve security, save network bandwidth, and reduce network latency. Wh...
Carlos Maltzahn, Kathy J. Richardson, Dirk Grunwal...