Sciweavers

3751 search results - page 537 / 751
» Events in security protocols
Sort
View
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 11 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
OSDI
2006
ACM
16 years 4 months ago
Fidelity and Yield in a Volcano Monitoring Sensor Network
We present a science-centric evaluation of a 19-day sensor network deployment at Reventador, an active volcano in Ecuador. Each of the 16 sensors continuously sampled seismic and ...
Geoffrey Werner-Allen, Konrad Lorincz, Jeff Johnso...
127
Voted
ICPP
2008
IEEE
15 years 10 months ago
TPTS: A Novel Framework for Very Fast Manycore Processor Architecture Simulation
The slow speed of conventional execution-driven architecture simulators is a serious impediment to obtaining desirable research productivity. This paper proposes and evaluates a f...
Sangyeun Cho, Socrates Demetriades, Shayne Evans, ...
ISCA
2008
IEEE
92views Hardware» more  ISCA 2008»
15 years 10 months ago
Counting Dependence Predictors
Modern processors rely on memory dependence prediction to execute load instructions as early as possible, speculating that they are not dependent on an earlier, unissued store. To...
Franziska Roesner, Doug Burger, Stephen W. Keckler
IMC
2005
ACM
15 years 9 months ago
Novel Approaches to End-to-End Packet Reordering Measurement
By providing the best-effort service, the Internet Protocol (IP) does not maintain the same order of packets sent out by a host. Therefore, due to the route change, parallelism in...
Xiapu Luo, Rocky K. C. Chang