Sciweavers

3528 search results - page 596 / 706
» A New Approach to Planning in Networks
Sort
View
SIGCOMM
2003
ACM
15 years 3 months ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson
AINA
2010
IEEE
15 years 3 months ago
CAPTCHA Using Strangeness in Machine Translation
— CAPTCHA is a technique that is used to prevent automatic programs from being able to acquire free e-mail or online service accounts. However, as many researchers have already r...
Takumi Yamamoto, J. Doug Tygar, Masakatsu Nishigak...
DANCE
2002
IEEE
15 years 2 months ago
Active Names: Flexible Location and Transport of Wide-Area Resources
In this paper, we explore flexible name resolution as a way of supporting extensibility for wide-area distributed services. Our approach, called Active Names, maps names to a cha...
Amin Vahdat, Michael Dahlin, Thomas E. Anderson, A...
KIVS
2001
Springer
15 years 2 months ago
Evaluating the GPRS Radio Interface for Different Quality of Service Profiles
This paper presents a discrete-event simulator for the General Packet Radio Service (GPRS) on the IP level. GPRS is a standard on packet data in GSM systems that will become commer...
Christoph Lindemann, Axel Thümmler
IPPS
2000
IEEE
15 years 2 months ago
Reducing Ownership Overhead for Load-Store Sequences in Cache-Coherent Multiprocessors
Parallel programs that modify shared data in a cachecoherent multiprocessor with a write-invalidate coherence protocol create ownership overhead in the form of ownership acquisiti...
Jim Nilsson, Fredrik Dahlgren