Sciweavers

14704 search results - page 2762 / 2941
» computing 2007
Sort
View
150
Voted
ICON
2007
IEEE
15 years 10 months ago
TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks
— Security is paramount in Mobile Ad-hoc Networks (MANET) as they are not conducive to centralized trusted authorities. Several solutions have been proposed MANET in the areas of...
Venkatesan Balakrishnan, Vijay Varadharajan, Udaya...
149
Voted
DSN
2007
IEEE
15 years 7 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
138
Voted
ACSC
2007
IEEE
15 years 10 months ago
Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol
Wireless Mesh Networks (WMNs) have recently gained increasing attention and have emerged as a technology with great potential for a wide range of applications. WMNs can be conside...
Asad Amir Pirzada, Marius Portmann, Jadwiga Induls...
117
Voted
ICNS
2007
IEEE
15 years 10 months ago
IGMPS, a New Tool for Estimating End-to-End Available Bandwidth in IP Network Paths
— This paper presents a new end-to-end available bandwidth measurement tool called IGMPS (Improved Gap Model using Packet Size parameter). IGMPS is a lightweight tool based on a ...
Ahmed Ait Ali, Francis Lepage
144
Voted
ICS
2007
Tsinghua U.
15 years 9 months ago
Cooperative cache partitioning for chip multiprocessors
This paper presents Cooperative Cache Partitioning (CCP) to allocate cache resources among threads concurrently running on CMPs. Unlike cache partitioning schemes that use a singl...
Jichuan Chang, Gurindar S. Sohi
« Prev « First page 2762 / 2941 Last » Next »