Sciweavers

3134 search results - page 400 / 627
» Embedded System Design for Network Time Synchronization
Sort
View
DAC
2009
ACM
16 years 5 months ago
Optimal static WCET-aware scratchpad allocation of program code
Caches are notorious for their unpredictability. It is difficult or even impossible to predict if a memory access will result in a definite cache hit or miss. This unpredictabilit...
Heiko Falk, Jan C. Kleinsorge
ISWC
1998
IEEE
15 years 8 months ago
Development of a Commercially Successful Wearable Data Collection System
Symbol Technologies has completed a unique accomplishment; it has created a commercially successful Wearable Computer. The success of this product is directly due to a structured ...
Robert Stein, Stephen Ferrero, Margaret Hetfield, ...
ACNS
2009
Springer
113views Cryptology» more  ACNS 2009»
15 years 8 months ago
Fast Packet Classification Using Condition Factorization
Abstract. Rule-based packet classification plays a central role in network intrusion detection systems such as Snort. To enhance performance, these rules are typically compiled int...
Alok Tongaonkar, R. Sekar, Sreenaath Vasudevan
INFOCOM
2008
IEEE
15 years 11 months ago
Peacock Hashing: Deterministic and Updatable Hashing for High Performance Networking
—Hash tables are extensively used in networking to implement data-structures that associate a set of keys to a set of values, as they provide O(1), query, insert and delete opera...
Sailesh Kumar, Jonathan S. Turner, Patrick Crowley
JSAC
2006
137views more  JSAC 2006»
15 years 4 months ago
Adaptive Defense Against Various Network Attacks
In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...