Sciweavers

11371 search results - page 2229 / 2275
» The network inhibition problem
Sort
View
INFOCOM
2003
IEEE
15 years 3 months ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
INFOCOM
2003
IEEE
15 years 3 months ago
Measurement-Based Optimization Techniques for Bandwidth-Demanding Peer-to-Peer Systems
— Measurement-based optimization is one important strategy to improve the performance of bandwidth-demanding peer-to-peer systems. However, to date, we have little quantitative k...
T. S. Eugene Ng, Yang-Hua Chu, Sanjay G. Rao, Kunw...
IPPS
2003
IEEE
15 years 3 months ago
Applying Aspect-Orient Programming Concepts to a Component-Based Programming Model
Abstract— The execution environments For scientific applications have evolved significantly over the years. Vector and parallel architectures have provided significantly faste...
Thomas Eidson, Jack Dongarra, Victor Eijkhout
MICRO
2003
IEEE
109views Hardware» more  MICRO 2003»
15 years 3 months ago
TLC: Transmission Line Caches
It is widely accepted that the disproportionate scaling of transistor and conventional on-chip interconnect performance presents a major barrier to future high performance systems...
Bradford M. Beckmann, David A. Wood
SIGECOM
2003
ACM
174views ECommerce» more  SIGECOM 2003»
15 years 3 months ago
Collaboration software to reduce inventory and increase response
Some recent trends in business and manufacturing hold the promise of greater profits, yet, due to profit-robbing inventory increases, this promise has not been fully realized. [9]...
Indu Bingham, Barbara Hoefle, Kim Phan, Jim Sizemo...
« Prev « First page 2229 / 2275 Last » Next »