Sciweavers

2663 search results - page 180 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
70
Voted
CN
2006
91views more  CN 2006»
14 years 10 months ago
End-host controlled multicast routing
The last decade has seen a deluge of proposals for supporting multicast in the Internet. These proposals can be categorized as either infrastructure-based, with the multicast func...
Karthik Lakshminarayanan, Ananth Rao, Ion Stoica, ...
83
Voted
FAST
2009
14 years 8 months ago
BORG: Block-reORGanization for Self-optimizing Storage Systems
This paper presents the design, implementation, and evaluation of BORG, a self-optimizing storage system that performs automatic block reorganization based on the observed I/O wor...
Medha Bhadkamkar, Jorge Guerra, Luis Useche, Sam B...
RAID
2009
Springer
15 years 5 months ago
Regular Expression Matching on Graphics Hardware for Intrusion Detection
The expressive power of regular expressions has been often exploited in network intrusion detection systems, virus scanners, and spam filtering applications. However, the flexibl...
Giorgos Vasiliadis, Michalis Polychronakis, Spyros...
MATA
2005
Springer
169views Communications» more  MATA 2005»
15 years 4 months ago
Facilitating Context-Awareness Through Hardware Personalization Devices: The Simplicity Device
Abstract. The paper presents the specification, development and initial performance evaluation of the Simplicity Device (SD), which is one of the key components of the SIMPLICITY A...
J. Papanis, Sofia Kapellaki, Eleftherios Koutsolou...
DATE
1999
IEEE
120views Hardware» more  DATE 1999»
15 years 2 months ago
Hardware Synthesis from C/C++ Models
Software programming languages, such as C/C++, have been used as means for specifying hardware for quite a while. Different design methodologies have exploited the advantages of f...
Giovanni De Micheli