Sciweavers

480 search results - page 81 / 96
» Anonymous Transactions in Computer Networks
Sort
View
106
Voted
HPDC
2008
IEEE
15 years 6 months ago
XenLoop: a transparent high performance inter-vm network loopback
Advances in virtualization technology have focused mainly on strengthening the isolation barrier between virtual machines (VMs) that are co-resident within a single physical machi...
Jian Wang, Kwame-Lante Wright, Kartik Gopalan
125
Voted
NOCS
2008
IEEE
15 years 6 months ago
Debugging Distributed-Shared-Memory Communication at Multiple Granularities in Networks on Chip
We present a methodology to debug a SOC by concentrating on its communication. Our extended communication model includes a) multiple signal groups per interface protocol at each I...
Bart Vermeulen, Kees Goossens, Siddharth Umrani
116
Voted
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 5 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
98
Voted
RECOMB
2005
Springer
16 years 21 days ago
Causal Inference of Regulator-Target Pairs by Gene Mapping of Expression Phenotypes
Background: Correlations between polymorphic markers and observed phenotypes provide the basis for mapping traits in quantitative genetics. When the phenotype is gene expression, ...
David Kulp, Manjunatha Jagalur
91
Voted
CCR
2010
179views more  CCR 2010»
15 years 15 days ago
An argument for increasing TCP's initial congestion window
TCP flows start with an initial congestion window of at most four segments or approximately 4KB of data. Because most Web transactions are short-lived, the initial congestion wind...
Nandita Dukkipati, Tiziana Refice, Yuchung Cheng, ...