Sciweavers

8503 search results - page 1316 / 1701
» Secure Software Architectures
Sort
View
DAC
2006
ACM
15 years 9 months ago
DFM: where's the proof of value?
How can design teams employ new tools and develop response methodologies yet still stay within design budgets? How much effort does it require to be an early adopter and what kind...
Shishpal Rawat, Raul Camposano, A. Kahng, Joseph S...
PPOPP
2006
ACM
15 years 9 months ago
High-performance IPv6 forwarding algorithm for multi-core and multithreaded network processor
IP forwarding is one of the main bottlenecks in Internet backbone routers, as it requires performing the longest-prefix match at 10Gbps speed or higher. IPv6 forwarding further ex...
Xianghui Hu, Xinan Tang, Bei Hua
SIGCOMM
2006
ACM
15 years 9 months ago
In VINI veritas: realistic and controlled network experimentation
This paper describes VINI, a virtual network infrastructure that allows network researchers to evaluate their protocols and services in a realistic environment that also provides ...
Andy C. Bavier, Nick Feamster, Mark Huang, Larry L...
CCGRID
2005
IEEE
15 years 9 months ago
Semantic search of learning services in a grid-based collaborative system
CSCL systems can benefit from using a grid, since it offers a common infrastructure allowing an extended pool of resources that can provide supercomputing capabilities as well as...
Guillermo Vega-Gorgojo, Miguel L. Bote-Lorenzo, Ed...
DATE
2005
IEEE
104views Hardware» more  DATE 2005»
15 years 9 months ago
Queue Management in Network Processors
: - One of the main bottlenecks when designing a network processing system is very often its memory subsystem. This is mainly due to the state-of-the-art network links operating at...
Ioannis Papaefstathiou, Theofanis Orphanoudakis, G...
« Prev « First page 1316 / 1701 Last » Next »