Sciweavers

132 search results - page 21 / 27
» Towards a Maintainability Evaluation in Software Architectur...
Sort
View
COMSWARE
2006
IEEE
15 years 5 months ago
Architecting protocol stack optimizations on mobile devices
Applications using traditional protocol stacks (e.g TCP/IP) from wired networks do not function efficiently in mobile wireless scenarios. This is primarily due to the layered archi...
Vijay T. Raisinghani, Sridhar Iyer
DAC
2007
ACM
16 years 2 months ago
Implicitly Parallel Programming Models for Thousand-Core Microprocessors
This paper argues for an implicitly parallel programming model for many-core microprocessors, and provides initial technical approaches towards this goal. In an implicitly paralle...
Wen-mei W. Hwu, Shane Ryoo, Sain-Zee Ueng, John H....
CISIS
2010
IEEE
15 years 7 months ago
Bringing Introspection Into the BlobSeer Data-Management System Using the MonALISA Distributed Monitoring Framework
Abstract—Introspection is the prerequisite of an autonomic behavior, the first step towards a performance improvement and a resource-usage optimization for largescale distribute...
Alexandra Carpen-Amarie, Jing Cai, Alexandru Costa...
111
Voted
CSMR
2008
IEEE
15 years 8 months ago
Goto Elimination Strategies in the Migration of Legacy Code to Java
Legacy systems are often large and difficult to maintain, but rewriting them from scratch is usually not a viable option. Reenginering remains the only way to modernize them. We ...
Mariano Ceccato, Paolo Tonella, Cristina Matteotti
132
Voted
ISW
2005
Springer
15 years 7 months ago
gore: Routing-Assisted Defense Against DDoS Attacks
Abstract. We present gore, a routing-assisted defense architecture against distributed denial of service (DDoS) attacks that provides guaranteed levels of access to a network under...
Stephen T. Chou, Angelos Stavrou, John Ioannidis, ...