Filters








617 Hits in 5.6 sec

Enabling Gigabit Network Access to End Users

S. Zeadally, L. Zhang
2004 Proceedings of the IEEE  
We then investigate the bottleneck at the end system by exploring experimentally the performance benefits of a network interface architecture designed for enabling high-performance, low-latency applications  ...  We argue that such a network interface architecture will eliminate the bottlenecks prevalent in current end systems and, consequently, enables users to reap the full benefits of high-speed networks available  ...  His valuable feedback and comments on several drafts of this paper significantly helped us improve the originality, quality, organization, and presentation of this work.  ... 
doi:10.1109/jproc.2003.821905 fatcat:iy3fcg6n2zd3lgjrimpx2kr5qe

Improving interactive performance using TIPME

Yasuhiro Endo, Margo Seltzer
2000 Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems - SIGMETRICS '00  
We describe TIPME (The Interactive Performance Monitoring Environment), a collection of measurement tools that allowed us to quickly and easily diagnose interactive performance "bugs" in a mature operating  ...  On the vast majority of today's computers, the dominant form of computation is GUI-based user interaction. In such an environment, the user's perception is the final arbiter of performance.  ...  Figure 6 . 6 Latency Distribution under Windows 95 and Windows NT 4.0. We executed the microbenchmark described in Section 4.1.1 under Windows 95 and Windows NT 4.0.  ... 
doi:10.1145/339331.339420 dblp:conf/sigmetrics/EndoS00 fatcat:li7ov4htwbhqhfgm7sxqro6yxe

Improving interactive performance using TIPME

Yasuhiro Endo, Margo Seltzer
2000 Performance Evaluation Review  
We describe TIPME (The Interactive Performance Monitoring Environment), a collection of measurement tools that allowed us to quickly and easily diagnose interactive performance "bugs" in a mature operating  ...  On the vast majority of today's computers, the dominant form of computation is GUI-based user interaction. In such an environment, the user's perception is the final arbiter of performance.  ...  Figure 6 . 6 Latency Distribution under Windows 95 and Windows NT 4.0. We executed the microbenchmark described in Section 4.1.1 under Windows 95 and Windows NT 4.0.  ... 
doi:10.1145/345063.339420 fatcat:u2rf3b6s3bdv5i4lrrzuki3ini

Cluster computing: the commodity supercomputer

Mark Baker, Rajkumar Buyya
1999 Software, Practice & Experience  
Finally, we summarise our findings and draw a number of conclusions relating to the usefulness and likely future of cluster computing.  ...  We describe the current enabling technologies and present four state-of-theart cluster-based projects.  ...  ACKNOWLEDGEMENTS We would like to thank Rose Rayner, John Rosbottom, Toni Cortes and Lars Rzymianowicz for their efforts proof reading this paper.  ... 
doi:10.1002/(sici)1097-024x(199905)29:6<551::aid-spe248>3.0.co;2-c fatcat:sxxtvtczcrb75fxl4olnbljiqi

Measurement of the Performance of IP Packets over ATM Environment via Multiprotocol-over-ATM (MPOA) [chapter]

Kai-Oliver Detken
2000 Lecture Notes in Computer Science  
Furthermore, the integration of existing network with reduced protocol overhead and reduced equipment is a crucial point in terms of network performance cost efficiency.  ...  MPOA provides and delivers the functions of a router and takes advantage of the underlying ATM network as much as possible. That means, MPOA works as a virtual router with real QoS features of ATM.  ...  On many implementations, the standard window prevents sending enough data to fill a high-latency connection. 2.  ... 
doi:10.1007/3-540-40019-2_10 fatcat:e5mvawptdvhxpgsamv6op2trge

Integration of Aortic Nerve Inputs in Hypertensive Rats

J. Zhang, S. W. Mifflin
2000 Hypertension  
Based on onset latency and the ability of monosynaptic neurons (MSNs) to respond to each of 2 AN stimuli separated by 5 ms, cells in HT and NT rats were divided into 3 groups: short-latency MSNs (SLMSNs  ...  A higher percentage of PSNs (73% versus 61%) and a lower percentage of SLMSNs (20% versus 27%) or LLMSNs (7% versus 12%) were found in HT rats (PϽ0.05).  ...  The authors gratefully acknowledge the expert technical assistance of Myrna Herrera-Rosales and Melissa Vitela.  ... 
doi:10.1161/01.hyp.35.1.430 pmid:10642337 fatcat:74ze6xvnv5bzfnauyef2ydtb6i

Techniques for optimizing CORBA middleware for distributed embedded systems

A. Gokhale, D.C. Schmidt
1999 IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320)  
However, stringent constraints on the available memory in embedded systems imposes a severe limit on the footprint of CORBA middleware.  ...  Second, we compare the performance and footprint of TAO IDL compiler-generated stubs and skeletons that use compiled and/or interpretive marshaling for a wide range of IDL data types.  ...  On Window NT, we used the dumpbin binary utility.  ... 
doi:10.1109/infcom.1999.751385 dblp:conf/infocom/GokhaleS99 fatcat:z3cap67ptzcullg6pax6o7ssxu

SW Annotation Techniques and RTOS Modelling for Native Simulation of Heterogeneous Embedded Systems [chapter]

Hctor Posadas, lvaro Daz, Eugenio Villar
2012 Embedded Systems - Theory and Design Methodology  
Even, the use of interruptions and drivers can be modelled in the simulation.  ...  One of the reasons to use WINE is that, in accordance with the "Wine Developer's Guide", its architecture and kernel are based on the architecture and kernel of Windows NT, so that its behavior will be  ... 
doi:10.5772/38000 fatcat:qjqui2gq4jbs7ltckomij3seci

SDN-based detection of self-propagating ransomware: The case of BadRabbit

Fahad M. Alotaibi, Vassilios G. Vassilakis
2021 IEEE Access  
The performance is evaluated based on five criteria: the time taken to detect BadRabbit, CPU utilization rate, Ping latency, TCP latency, and the capability of the solutions to detect other types of  ...  These files are: • Dispci.exe: Performs the encryption and decryption with the help of the DiskCryptor driver, cscc.dat, which encrypts files individually based on their extensions. • Cscc.dat: A legitimate  ...  He holds a Masters degree in Cybersecurity from the University of York, United Kingdom. During his BA studies, Fahad worked as a freelancer in two fields; Penetration testing and e-commerce.  ... 
doi:10.1109/access.2021.3058897 fatcat:tsfyuws76nfdpgrrx3aostq6da

Test Environment Design for Wireless Vehicle Communications

Peter Lerchbaumer, Alejandro Ochoa, Elisabeth Uhlemann
2007 Vehicular Technology Conference-Fall (VTC-FALL), Proceedings, IEEE  
In addition, suggestions for a hardware platform and an operating system for the development of a suitable on-board test-bed for performance measurements are presented.  ...  One such component is a simulator that enables VANET performance evaluation and allows identification of bottlenecks in the network functionality.  ...  Her uncomplicated but professional and efficient way of treating projects was a great help for accomplishing the aims of our thesis.  ... 
doi:10.1109/vetecf.2007.464 dblp:conf/vtc/LerchbaumerOU07 fatcat:oni4rphny5f63lnighk3zxlbau

A physiological signal processing system for optimal engagement and attention detection

A. Belle, R. Hobson, K. Najarian
2011 2011 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)  
Accuracy Comparison Here the ECG data and EEG data of each subject is taken and feature analysis is performed on them separately.  ...  By increasing the weights of one class over the other, the sensitivity and specificity of the models performance can be varied.  ...  The table displays a column showing which of these features were selected and not selected for the final 281 features used after feature space reduction step.  ... 
doi:10.1109/bibmw.2011.6112429 dblp:conf/bibm/BelleHN11 fatcat:jprve3btxnc4jd4rvakyoyelve

Javia: A Java interface to the virtual interface architecture

Chi-Chao Chang, Thorsten von Eicken
2000 Concurrency Practice and Experience  
At this point, commercial hardware that implements the VI architecture is available for Windows NT/2000.  ...  Research in JITs, static Java compilers, locking strategies, and garbage collectors [ACL+98, ADM+98, BKM+98, FKR+99, MGG98] have delivered promising results, gradually reducing the performance gap between  ...  Marmot does not rely on any external compiler or back-end and currently runs on P-II based PCs with Windows NT/2000.  ... 
doi:10.1002/1096-9128(200005)12:7<573::aid-cpe500>3.0.co;2-o fatcat:jd2jxcyxxjbfdfdypnwupgie7i

Embedded application design using a real-time OS

David Stepner, Nagarajan Rajan, David Hui
1999 Proceedings of the 36th ACM/IEEE conference on Design automation conference - DAC '99  
The Evaluation Project was launched with reports of Windows NT and its real-time extensions. Real Time Consulting also maintains the RTOS Buyers Guide.  ...  One technique is the redundant storage of critical variables, and comparison prior to being used. Another is the grouping of critical variables together and keeping a CRC over each group.  ... 
doi:10.1145/309847.310566 dblp:conf/dac/StepnerRH99 fatcat:a6nfvfwxozgpdf2rcja47bl64e

The gradient of spatial auditory attention in free field: An event-related potential study

Wolfgang A. Teder-Sälejärvi, Steven A. Hillyard
1998 Perception & Psychophysics  
support for gradient models of auditory spatial attention.  ...  Frequent "standard" stimuli (90%) and infrequent "target/deviant" stimuli (100,6) of increased bandwidth were delivered at a fast rate in a random sequence equiprobably from each speaker.  ...  Figure 6 . 6 Grand average mean amplitudes of Nt and Nd to standards and Nt to deviants (top row,site Cz, window 120-200 msec) and P3 (bottom row; site Pz, window 350-550 msec) in three different conditions  ... 
doi:10.3758/bf03206172 pmid:9821784 fatcat:cbg2frkw6begnmk73mr423jxta

A Survey of Stealth Malware: Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions [article]

Ethan M. Rudd, Andras Rozsa, Manuel Günther, Terrance E. Boult
2016 arXiv   pre-print
The most notable of these flawed assumptions is the closed world assumption: that no sample belonging to a class outside of a static training set will appear at query time.  ...  As our professional, social, and financial existences become increasingly digitized and as our government, healthcare, and military infrastructures rely more on computer technologies, they present larger  ...  Each device object has at least one device driver. Communication between kernel and device driver is performed via the I/O manager.  ... 
arXiv:1603.06028v2 fatcat:dyyemahzjze6bltxlwnnqgeyzy
« Previous Showing results 1 — 15 out of 617 results