Sciweavers

327 search results - page 46 / 66
» Trace register allocation
Sort
View
INFOCOM
2002
IEEE
15 years 3 months ago
Fair Scheduling and Buffer Management in Internet Routers
Abstract—Input buffered switch architecture has become attractive for implementing high performance routers and expanding use of the Internet sees an increasing need for quality ...
Nan Ni, Laxmi N. Bhuyan
CONEXT
2009
ACM
15 years 1 days ago
The age of impatience: optimal replication schemes for opportunistic networks
: We study mobile P2P content dissemination schemes which leverage the local dedicated caches provided by hand-held devices (e.g., smart-phones, PDAs) and opportunistic contacts be...
Joshua Reich, Augustin Chaintreau
WINET
2010
127views more  WINET 2010»
14 years 9 months ago
A Markov Decision Process based flow assignment framework for heterogeneous network access
We consider a scenario where devices with multiple networking capabilities access networks with heterogeneous characteristics. In such a setting, we address the problem of effici...
Jatinder Pal Singh, Tansu Alpcan, Piyush Agrawal, ...
ICC
2011
IEEE
206views Communications» more  ICC 2011»
13 years 10 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
DATE
2009
IEEE
113views Hardware» more  DATE 2009»
15 years 5 months ago
MPSoCs run-time monitoring through Networks-on-Chip
—Networks-on-Chip (NoCs) have appeared as design strategy to overcome the limitations, in terms of scalability, efficiency, and power consumption of current buses. In this paper...
Leandro Fiorin, Gianluca Palermo, Cristina Silvano