Sciweavers

4072 search results - page 567 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
126
Voted
ICNP
2007
IEEE
15 years 9 months ago
A Performance Study of Loss Detection/Recovery in Real-world TCP Implementations
— TCP is the dominant transport protocol used in the Internet and its performance fundamentally governs the performance of Internet applications. It is well-known that packet los...
Sushant Rewaskar, Jasleen Kaur, F. Donelson Smith
ISLPED
2005
ACM
85views Hardware» more  ISLPED 2005»
15 years 9 months ago
A low-power crossroad switch architecture and its core placement for network-on-chip
As the number of cores on a chip increases, power consumed by the communication structures takes significant portion of the overall power-budget. The individual components of the...
Kuei-Chung Chang, Jih-Sheng Shen, Tien-Fu Chen
136
Voted
SAINT
2008
IEEE
15 years 10 months ago
Accuracy-Based Cache Consistency Management for Numerical Object Replication
Object replication and cache consistency have been one of major design issues in the recent Internet applications. In this paper, we forcus on accuracy-aware applications (i.e., s...
Hideya Ochiai, Hiroshi Esaki
145
Voted
ETS
2007
IEEE
109views Hardware» more  ETS 2007»
15 years 10 months ago
Test Configurations for Diagnosing Faulty Links in NoC Switches
The paper proposes a new concept of diagnosing faulty links in Network-on-a-Chip (NoC) designs. The method is based on functional fault models and it implements packet address dri...
Jaan Raik, Raimund Ubar, Vineeth Govind
NDSS
2003
IEEE
15 years 8 months ago
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use t...
Tal Garfinkel