Sciweavers

2211 search results - page 132 / 443
» The state of peer-to-peer simulators and simulations
Sort
View
INFOCOM
2012
IEEE
13 years 15 days ago
ICP: Design and evaluation of an Interest control protocol for content-centric networking
—Content-centric networking (CCN) brings a paradigm shift in the present Internet communication model by addressing named-data instead of host locations. With respect to TCP/IP, ...
Giovanna Carofiglio, Massimo Gallo, Luca Muscariel...
ISCA
2012
IEEE
224views Hardware» more  ISCA 2012»
13 years 15 days ago
A first-order mechanistic model for architectural vulnerability factor
Soft error reliability has become a first-order design criterion for modern microprocessors. Architectural Vulnerability Factor (AVF) modeling is often used to capture the probab...
Arun A. Nair, Stijn Eyerman, Lieven Eeckhout, Lizy...
MASCOTS
2010
14 years 8 months ago
Efficient Web Requests Scheduling Considering Resources Sharing
Requests scheduling in Web servers is a hot research topic. Many works aim at providing optimal algorithms according to various metrics. Most of these works are based on classical ...
Simon Duquennoy, Gilles Grimaud
PIMRC
2010
IEEE
14 years 8 months ago
A multi-threshold scheme for feedback load reduction in multiuser MIMO broadcast channel
In a multiuser system, independent time-varying channels among different users can be exploited to provide multiuser diversity (MUD) gain and increase the system throughput. For th...
Jin-Hao Li, Hsuan-Jung Su, Yu-Lun Tsai
RAID
2010
Springer
14 years 8 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...