Sciweavers

2407 search results - page 111 / 482
» Design considerations for network processor operating system...
Sort
View
ASAP
2007
IEEE
134views Hardware» more  ASAP 2007»
15 years 5 months ago
Methodology and Toolset for ASIP Design and Development Targeting Cryptography-Based Applications
Network processors utilizing general-purpose instruction-set architectures (ISA) limit network throughput due to latency incurred from cryptography and hashing applications (AES, ...
David Montgomery, Ali Akoglu
ICS
2003
Tsinghua U.
15 years 9 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
INFOCOM
2008
IEEE
15 years 10 months ago
Peacock Hashing: Deterministic and Updatable Hashing for High Performance Networking
—Hash tables are extensively used in networking to implement data-structures that associate a set of keys to a set of values, as they provide O(1), query, insert and delete opera...
Sailesh Kumar, Jonathan S. Turner, Patrick Crowley
134
Voted
IPPS
2002
IEEE
15 years 8 months ago
A Middleware for Large Scale Networks Inspired by the Immune System
Very large scale networks such as the Internet require a new operational model to use resources efficiently and reduce the need for the administration necessary in clientserver n...
Mohamed Bakhouya, Jaafar Gaber, Abder Koukam
INFOCOM
2007
IEEE
15 years 10 months ago
Algorithmic Aspects of Access Networks Design in B3G/4G Cellular Networks
— The forthcoming 4G cellular systems will provide broadband wireless access to a variety of advanced data and voice services. In order to do that, these networks will have a sig...
David Amzallag, Joseph Naor, Danny Raz