Sciweavers

20017 search results - page 3851 / 4004
» Using personas effectively
Sort
View
126
Voted
INFOCOM
2006
IEEE
15 years 8 months ago
Eclipse Attacks on Overlay Networks: Threats and Defenses
Abstract— Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains connections with a nu...
Atul Singh, Tsuen-Wan Ngan, Peter Druschel, Dan S....
116
Voted
IPPS
2006
IEEE
15 years 8 months ago
Hash-based proximity clustering for load balancing in heterogeneous DHT networks
DHT networks based on consistent hashing functions have an inherent load uneven distribution problem. The objective of DHT load balancing is to balance the workload of the network...
Haiying Shen, Cheng-Zhong Xu
ISCA
2006
IEEE
187views Hardware» more  ISCA 2006»
15 years 8 months ago
A Case for MLP-Aware Cache Replacement
Performance loss due to long-latency memory accesses can be reduced by servicing multiple memory accesses concurrently. The notion of generating and servicing long-latency cache m...
Moinuddin K. Qureshi, Daniel N. Lynch, Onur Mutlu,...
114
Voted
ISCAS
2006
IEEE
121views Hardware» more  ISCAS 2006»
15 years 8 months ago
A frequency domain based TEQ design for DSL systems
that the equivalent channel is approximately an impulse. In [7], Martin et al. propose a globally convergent blind adap-In this paper, we propose a frequency domain based de- tive ...
Yuan-Pei Lin, Yu-Pin Lin, See-May Phoong
ISCAS
2006
IEEE
145views Hardware» more  ISCAS 2006»
15 years 8 months ago
The wordlength determination problem of linear time invariant systems with multiple outputs - a geometric programming approach
This paper proposes two new methods for optimizing objectives and constraints. The GP approach is very general and hardware resources in finite wordlength implementation of it allo...
S. C. Chan, K. M. Tsui
« Prev « First page 3851 / 4004 Last » Next »