Sciweavers

1336 search results - page 210 / 268
» SMTP Path Analysis
Sort
View
ISCA
2008
IEEE
150views Hardware» more  ISCA 2008»
15 years 6 months ago
Fetch-Criticality Reduction through Control Independence
Architectures that exploit control independence (CI) promise to remove in-order fetch bottlenecks, like branch mispredicts, instruction-cache misses and fetch unit stalls, from th...
Mayank Agarwal, Nitin Navale, Kshitiz Malik, Matth...
KBSE
2008
IEEE
15 years 6 months ago
Test-Suite Augmentation for Evolving Software
One activity performed by developers during regression testing is test-suite augmentation, which consists of assessing the adequacy of a test suite after a program is modified an...
Raúl A. Santelices, Pavan Kumar Chittimalli...
118
Voted
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
15 years 6 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar
WCNC
2008
IEEE
15 years 6 months ago
Hop-by-Hop Routing Strategy for Multihop Decode-and-Forward Cooperative Networks
Abstract— In this paper, focusing on multihop decode-andforward cooperative networks, a hop-by-hop routing strategy is designed to optimize the end-to-end outage performance when...
Lu Zhang 0005, Leonard J. Cimini Jr.
ARITH
2007
IEEE
15 years 6 months ago
Decimal Floating-Point Multiplication Via Carry-Save Addition
Decimal multiplication is important in many commercial applications including financial analysis, banking, tax calculation, currency conversion, insurance, and accounting. This p...
Mark A. Erle, Michael J. Schulte, Brian J. Hickman...