Sciweavers

529 search results - page 88 / 106
» Source Address Validation: Architecture and Protocol Design
Sort
View
SIGMETRICS
2011
ACM
229views Hardware» more  SIGMETRICS 2011»
14 years 2 months ago
Model-driven optimization of opportunistic routing
Opportunistic routing aims to improve wireless performance by exploiting communication opportunities arising by chance. A key challenge in opportunistic routing is how to achieve ...
Eric Rozner, Mi Kyung Han, Lili Qiu, Yin Zhang
SIGMETRICS
2010
ACM
213views Hardware» more  SIGMETRICS 2010»
15 years 4 months ago
Small subset queries and bloom filters using ternary associative memories, with applications
Associative memories offer high levels of parallelism in matching a query against stored entries. We design and analyze an architecture which uses a single lookup into a Ternary C...
Ashish Goel, Pankaj Gupta
DAC
2000
ACM
16 years 21 days ago
Forensic engineering techniques for VLSI CAD tools
The proliferation of the Internet has a ected the business model of almost all semiconductor and VLSI CAD companies that rely on intellectual property (IP) as their main source of...
Darko Kirovski, David T. Liu, Jennifer L. Wong, Mi...
HPCA
2006
IEEE
16 years 3 days ago
The common case transactional behavior of multithreaded programs
Transactional memory (TM) provides an easy-to-use and high-performance parallel programming model for the upcoming chip-multiprocessor systems. Several researchers have proposed a...
JaeWoong Chung, Hassan Chafi, Chi Cao Minh, Austen...
JCDL
2005
ACM
162views Education» more  JCDL 2005»
15 years 5 months ago
Integrating digital libraries and electronic publishing in the DART project
The Digital Anthropology Resources for Teaching (DART) project integrates the content acquisition and cataloging initiatives of a federated digital repository with the development...
Gordon Dahlquist, Brian Hoffman, David Millman