Sciweavers

84 search results - page 17 / 17
» Design of a crawler with bounded bandwidth
Sort
View
ISCA
1995
IEEE
98views Hardware» more  ISCA 1995»
13 years 9 months ago
Instruction Fetching: Coping with Code Bloat
Previous research has shown that the SPEC benchmarks achieve low miss ratios in relatively small instruction caches. This paper presents evidence that current software-development...
Richard Uhlig, David Nagle, Trevor N. Mudge, Stuar...
JCM
2006
77views more  JCM 2006»
13 years 6 months ago
Promote the Use of Explicit Delay Control
The Internet is undergoing changes of its traffic mix, with the IP-based interactive multimedia applications gaining momentum. According to studies, UDP-based multimedia traffic ha...
Xiaoyuan Gu, Dirk Markwardt, Lars C. Wolf
COMCOM
1998
102views more  COMCOM 1998»
13 years 5 months ago
Preferred link based delay-constrained least-cost routing in wide area networks
Multimedia applications involving digital audio and/or digital video transmissions require strict QoS constraints (end-to-end delay bound, bandwidth availability, packet loss rate...
R. Sriram, Govindarasu Manimaran, C. Siva Ram Murt...
CASES
2010
ACM
13 years 4 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman