Sciweavers

2663 search results - page 175 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
SIGCOMM
2005
ACM
15 years 4 months ago
A DoS-limiting network architecture
We present the design and evaluation of TVA, a network architecture that limits the impact of Denial of Service (DoS) floods from the outset. Our work builds on earlier work on c...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
MIDDLEWARE
2004
Springer
15 years 3 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
DATE
2002
IEEE
100views Hardware» more  DATE 2002»
15 years 3 months ago
AccuPower: An Accurate Power Estimation Tool for Superscalar Microprocessors
This paper describes the AccuPower toolset -- a set of simulation tools accurately estimating the power dissipation within a superscalar microprocessor. AccuPower uses a true hard...
Dmitry Ponomarev, Gurhan Kucuk, Kanad Ghose
FCCM
2009
IEEE
115views VLSI» more  FCCM 2009»
15 years 2 months ago
Multi-Core Architecture on FPGA for Large Dictionary String Matching
FPGA has long been considered an attractive platform for high performance implementations of string matching. However, as the size of pattern dictionaries continues to grow, such ...
Qingbo Wang, Viktor K. Prasanna
EDCC
2006
Springer
15 years 2 months ago
Construction of a Highly Dependable Operating System
It has been well established that most operating system crashes are due to bugs in device drivers. Because drivers are normally linked into the kernel address space, a buggy drive...
Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Ho...