Sciweavers

5079 search results - page 987 / 1016
» Hidden-Action in Network Routing
Sort
View
ASPLOS
2006
ACM
15 years 3 months ago
Tartan: evaluating spatial computation for whole program execution
Spatial Computing (SC) has been shown to be an energy-efficient model for implementing program kernels. In this paper we explore the feasibility of using SC for more than small k...
Mahim Mishra, Timothy J. Callahan, Tiberiu Chelcea...
SAC
2006
ACM
15 years 3 months ago
An anomaly-driven reverse proxy for web applications
Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the...
Fredrik Valeur, Giovanni Vigna, Christopher Kr&uum...
SIGECOM
2006
ACM
88views ECommerce» more  SIGECOM 2006»
15 years 3 months ago
Implementation with a bounded action space
While traditional mechanism design typically assumes isomorphism between the agents’ type- and action spaces, in many situations the agents face strict restrictions on their act...
Liad Blumrosen, Michal Feldman
AICCSA
2005
IEEE
104views Hardware» more  AICCSA 2005»
15 years 3 months ago
Multicast address management in the Internet: a study of the port blocking problem
A critical issue in multicast communication is how to identify multicast groups. In the Internet, multicast addresses and port numbers distinguish multicast groups from each other...
Emad Eldin Mohamed, Hussein M. Abdel-Wahab, I. Sal...
HICSS
2005
IEEE
145views Biometrics» more  HICSS 2005»
15 years 3 months ago
Towards a Reliable and Efficient Distributed Storage System
This paper presents RDSS, a Resource Area Network (RAN)-based Distributed Storage System, which is designed for high scalability, long-term reliability, and operational efficiency...
Xiaodong Li, Chang Liu