Sciweavers

5234 search results - page 910 / 1047
» Simulation of Computer Network Attacks
Sort
View
110
Voted
MM
2006
ACM
125views Multimedia» more  MM 2006»
15 years 9 months ago
Scalable streaming for heterogeneous clients
Periodic broadcast protocols enable the efficient streaming of highly popular media files to large numbers of concurrent clients. Most previous periodic broadcast protocols, howe...
Liqi Shi, Phillipa Sessini, Anirban Mahanti, Zongp...
114
Voted
SLIP
2006
ACM
15 years 9 months ago
Statistical crosstalk aggressor alignment aware interconnect delay calculation
Crosstalk aggressor alignment induces significant interconnect delay variation and needs to be taken into account in a statistical timer. In this paper, we approximate crosstalk ...
Andrew B. Kahng, Bao Liu, Xu Xu
DSN
2005
IEEE
15 years 9 months ago
Perturbation-Resistant and Overlay-Independent Resource Discovery
This paper realizes techniques supporting the position that strategies for resource location and discovery in distributed systems should be both perturbation-resistant and overlay...
Steven Y. Ko, Indranil Gupta
118
Voted
DSN
2005
IEEE
15 years 9 months ago
Modeling and Automated Containment of Worms
Self-propagating codes, called worms, such as Code Red, Nimda, and Slammer, have drawn significant attention due to their enormous adverse impact on the Internet. There is a grea...
Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi
106
Voted
IPPS
2005
IEEE
15 years 9 months ago
A Hardware Acceleration Unit for MPI Queue Processing
With the heavy reliance of modern scientific applications upon the MPI Standard, it has become critical for the implementation of MPI to be as capable and as fast as possible. Th...
Keith D. Underwood, K. Scott Hemmert, Arun Rodrigu...