Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
ACISP
1997
Springer
11 years 9 months ago
A Method to Implement a Denial of Service Protection Base
Denial of service attack is an attempt from any authorized or unauthorized entity to allocate resources excessively to prevent normal operation of the system. A method will be pres...
Jussipekka Leiwo, Yuliang Zheng
HPDC
2003
IEEE
11 years 10 months ago
Policy Driven Heterogeneous Resource Co-Allocation with Gangmatching
Dynamic, heterogenous and distributively owned resource environments present unique challenges to the problems of resource representation, allocation and management. Conventional ...
Rajesh Raman, Miron Livny, Marvin H. Solomon
SBACPAD
2008
IEEE
100views Hardware» more  SBACPAD 2008»
11 years 12 months ago
Selection of the Register File Size and the Resource Allocation Policy on SMT Processors
The performance impact of the Physical Register File (PRF) size on Simultaneous Multithreading processors has not been extensively studied in spite of being a critical shared reso...
Jesús Alastruey, Teresa Monreal, Francisco ...
books