Sciweavers

ACISP
1997
Springer
13 years 8 months ago
A Method to Implement a Denial of Service Protection Base
Denial of service attack is an attempt from any authorized or unauthorized entity to allocate resources excessively to prevent normal operation of the system. A method will be pres...
Jussipekka Leiwo, Yuliang Zheng
HPDC
2003
IEEE
13 years 9 months ago
Policy Driven Heterogeneous Resource Co-Allocation with Gangmatching
Dynamic, heterogenous and distributively owned resource environments present unique challenges to the problems of resource representation, allocation and management. Conventional ...
Rajesh Raman, Miron Livny, Marvin H. Solomon
SBACPAD
2008
IEEE
100views Hardware» more  SBACPAD 2008»
13 years 11 months ago
Selection of the Register File Size and the Resource Allocation Policy on SMT Processors
The performance impact of the Physical Register File (PRF) size on Simultaneous Multithreading processors has not been extensively studied in spite of being a critical shared reso...
Jesús Alastruey, Teresa Monreal, Francisco ...