Sciweavers

451 search results - page 32 / 91
» Maintainability of the Linux kernel
Sort
View
SIGCOMM
2005
ACM
15 years 6 months ago
A DoS-limiting network architecture
We present the design and evaluation of TVA, a network architecture that limits the impact of Denial of Service (DoS) floods from the outset. Our work builds on earlier work on c...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
EUROCRYPT
2006
Springer
15 years 4 months ago
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Abstract. This paper studies the gaps that exist between cryptography as studied in theory, as defined in standards, as implemented by software engineers, and as actually consumed ...
Kenneth G. Paterson, Arnold K. L. Yau
CVPR
2008
IEEE
16 years 2 months ago
Robust dual motion deblurring
This paper presents a robust algorithm to deblur two consecutively captured blurred photos from camera shaking. Previous dual motion deblurring algorithms succeeded in small and s...
Jia Chen, Lu Yuan, Chi-Keung Tang, Long Quan
130
Voted
ECRTS
2007
IEEE
15 years 7 months ago
Integrating Hard/Soft Real-Time Tasks and Best-Effort Jobs on Multiprocessors
We present a multiprocessor scheduling framework for integrating hard and soft real-time tasks and best-effort jobs. This framework allows for full system utilization, and ensures...
Björn B. Brandenburg, James H. Anderson
79
Voted
CBSE
2006
Springer
15 years 4 months ago
Impact of Virtual Memory Managers on Performance of J2EE Applications
We investigate the impact of Operating System's Virtual Memory Managers (VMMs) on performance of enterprise applications. By taking various popular branches of the Linux kerne...
Alexander Ufimtsev, Alena Kucharenka, Liam Murphy