Sciweavers

4072 search results - page 554 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
131
Voted
DATE
2008
IEEE
182views Hardware» more  DATE 2008»
15 years 10 months ago
An adaptable FPGA-based System for Regular Expression Matching
In many applications string pattern matching is one of the most intensive tasks in terms of computation time and memory accesses. Network Intrusion Detection Systems and DNA Seque...
Ivano Bonesana, Marco Paolieri, Marco D. Santambro...
188
Voted

Publication
3459views
15 years 9 months ago
VirtFS--A virtualization aware File System pass-through
This paper describes the design and implementation of a paravirtualized file system interface for Linux in the KVM environment. Today’s solution of sharing host files on the gues...
Venkateswararao Jujjuri, Eric Van Hensbergen, Anth...
144
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
Reverse-engineering BitTorrent: A Markov approximation perspective
Abstract—BitTorrent has been the most popular P2P (Peer-toPeer) paradigm during recent years. Built upon great intuition, the piece-selection and neighbor-selection modules roote...
Ziyu Shao, Hao Zhang, Minghua Chen, Kannan Ramchan...
CDC
2009
IEEE
135views Control Systems» more  CDC 2009»
15 years 8 months ago
Trust Estimation in autonomic networks: a statistical mechanics approach
— Trust management, broadly intended as the ability to maintain belief relationship among entities, is recognized as a fundamental security challenge for autonomous and selforgan...
Stefano Ermon, Luca Schenato, Sandro Zampieri
164
Voted
MSWIM
2009
ACM
15 years 10 months ago
A performance evaluation framework for fair solutions in ad hoc networks
Fairness in multihop ad hoc networks has received considerable attention in the literature. Many schemes have been proposed, which attempt to compute the “optimal” bit rates o...
Manos Dramitinos, Rémi Vannier, Isabelle Gu...