Sciweavers

2862 search results - page 458 / 573
» Bicriteria Network Design Problems
Sort
View
DAC
2003
ACM
15 years 11 months ago
Efficient model order reduction including skin effect
Skin effect makes interconnect resistance and inductance frequency dependent. This paper addresses the problem of efficiently estimating the signal characteristics of any RLC netw...
Shizhong Mei, Chirayu S. Amin, Yehea I. Ismail
108
Voted
MIDDLEWARE
2007
Springer
15 years 4 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh
96
Voted
P2P
2010
IEEE
136views Communications» more  P2P 2010»
14 years 8 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
89
Voted
DAC
2000
ACM
15 years 11 months ago
Depth optimal incremental mapping for field programmable gate arrays
In this paper, we study the incremental t echnology mapping problem for lookup-table (LUT) based Field Programmable Gate Arrays (FPGAs) under incremental changes. Given a gate-lev...
Jason Cong, Hui Huang
83
Voted
WWW
2009
ACM
15 years 11 months ago
Efficient application placement in a dynamic hosting platform
Web hosting providers are increasingly looking into dynamic hosting to reduce costs and improve the performance of their platforms. Instead of provisioning fixed resources to each...
Zakaria Al-Qudah, Hussein A. Alzoubi, Mark Allman,...