Sciweavers

6110 search results - page 126 / 1222
» Graceful Network Operations
Sort
View
USENIX
2000
15 years 2 months ago
Malloc() Performance in a Multithreaded Linux Environment
Network servers make special demands that other types of applications may not make on memory allocators. We describe a simple malloc() microbenchmark suite that tests the ability ...
Chuck Lever, David Boreham
PAM
2011
Springer
14 years 3 months ago
FACT: Flow-Based Approach for Connectivity Tracking
More than 20 years after the launch of the public Internet, operator forums are still full of reports about temporary unreachability of complete networks. We propose FACT, a system...
Dominik Schatzmann, Simon Leinen, Jochen Köge...
97
Voted
EPS
1998
Springer
15 years 5 months ago
Dual Network Representation Applied to the Evolution of Neural Controllers
This paperpresentsa new approachto the evolutionof neuralnetworks. A linear chromosome combined with a grid-based representation of the network and a new crossover operator allow t...
João Carlos Figueira Pujol, Riccardo Poli
ESORICS
2009
Springer
15 years 7 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
TON
2010
152views more  TON 2010»
14 years 11 months ago
1 + N network protection for mesh networks: network coding-based protection using p-cycles
—p-Cycles have been proposed for preprovisioned 1 : N protection in optical mesh networks. Although the protection circuits are preconfigured, the detection of failures and the ...
Ahmed E. Kamal