Sciweavers

2416 search results - page 392 / 484
» The design and implementation of typed scheme
Sort
View
CLUSTER
2008
IEEE
14 years 2 months ago
Magnet: A novel scheduling policy for power reduction in cluster with virtual machines
—The concept of green computing has attracted much attention recently in cluster computing. However, previous local approaches focused on saving the energy cost of the components...
Liting Hu, Hai Jin, Xiaofei Liao, Xianjie Xiong, H...
HAPTICS
2008
IEEE
14 years 2 months ago
Model and Modeless Friction Compensation: Application to a Defective Haptic Interface
Abstract. This paper describes a preliminary work devoted to the design of a control architecture for a defective haptic interface, i.e. an underactuated haptic interface not able ...
Gianni Borghesan, Claudio Melchiorri
ICC
2008
IEEE
138views Communications» more  ICC 2008»
14 years 2 months ago
Dealing with Sudden Bandwidth Changes in TCP
— In this paper, we propose a novel technique to deal with sudden bandwidth changes in TCP. In the current Internet, sudden bandwidth changes may occur due to vertical handovers ...
Euiyul Ko, Donghyeok An, Ikjun Yeom
ICCCN
2008
IEEE
14 years 2 months ago
Sentinel: Hardware-Accelerated Mitigation of Bot-Based DDoS Attacks
—Effective defenses against DDoS attacks that deplete resources at the network and transport layers have been deployed commercially. Therefore, DDoS attacks increasingly use norm...
Peter Djalaliev, Muhammad Jamshed, Nicholas Farnan...
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
14 years 2 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...