24 Hits in 7.1 sec

LAPSES: a recipe for high performance adaptive router design

A.S. Vaidya, A. Sivasubramaniam, C.R. Das
1999 Proceedings Fifth International Symposium on High-Performance Computer Architecture  
This paper proposes a three step recipe -Look-Ahead routing, intelligent Path Selection, and an Economic Storage implementation, called the LAPSES approach -for cost-effective high performance pipelined  ...  adaptive router design.  ...  These three techniques used in conjunction with todays enabling router design technology can make high-performance adaptive routers a commercially viable and successful design choice.  ... 
doi:10.1109/hpca.1999.744375 dblp:conf/hpca/VaidyaSD99 fatcat:lmc35t4t2rbahazgofmhwcetru

Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services

Erwin Adi, Zubair Baig, Philip Hingston
2017 Journal of Network and Computer Applications  
Denial-of-service attack modelling and detection for HTTP/2 services. Retrieved from  ...  One explanation for having a very high lapse value was that the server was busy and incoming packets were queued.  ...  Routers often become the subject of DoS attacks and several studies were proposed for attack detection on routers.  ... 
doi:10.1016/j.jnca.2017.04.015 fatcat:qfufzlor2bbk7htg3ticypr6re

Market-Driven Winners

George S. Day
2001 Symphonya Emerging Issues in Management  
It is a far-reaching and fundamental change for many organizations, requiring them to abandon the very traditions that contributed to their past success.  ...  It cannot be delegated to the marketing department for it requires the willing involvement of all functions.  ...  This includes all the other capabilities for delivering customer valuefrom product design to order fulfillment, plus an adaptive organization design, and all the supporting systems, controls, measures  ... 
doi:10.4468/2001.2.02day fatcat:izl4lipxf5hxhbexcrvipzd2we

The case for free and open source software in research and scholarship

Laura Fortunato, Mark Galassi
2021 Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences  
Next, we illustrate how the notions introduced in the primer apply to resources for scientific computing, with reference to the GNU Scientific Library as a case study.  ...  Free and open source software (FOSS) is any computer program released under a licence that grants users rights to run the program for any purpose, to study it, to modify it, and to redistribute it in original  ...  Acknowledgements We thank Jeremy Allison, Jim Blandy, and Tom Tromey for discussion, and Malika Ihle, Adam Kenny, and Rowan Wilson for feedback on the manuscript.  ... 
doi:10.1098/rsta.2020.0079 pmid:33775148 fatcat:24acdk3xprfgpiomvrsuchn6oa

Intellectual Property and the Prisoner's Dilemma: A Game Theory Justification of Copyrights, Patents, and Trade Secrets

Adam D. Moore
2016 Social Science Research Network  
China was not considered for WTO or TRIPS membership until several years after the initial agreement. See Natalie P.  ...  Both have lots of novel machine designs or new recipes.  ...  For example, Clyde could sell Bonnie's recipe, the set of ideas, to local chefs for a fee. Alternatively, Bonnie could sell Clyde's widget-making machine designs to local merchants.  ... 
doi:10.2139/ssrn.2825252 fatcat:bd33xhykg5aztfsayj2wb2onve

The language of privacy

Michael Boyle, Saul Greenberg
2005 ACM Transactions on Computer-Human Interaction  
This theory yields a powerful vocabulary of terms that disambiguate the many interrelated and subtle meanings of "privacy." iv Lastly, I developed a systematic method for applying the vocabulary of the  ...  These studies suggest that although they are widely suspected to be useful for mitigating privacy issues in video media spaces, these techniques fail to adequately balance awareness and privacy in high-risk  ...  high-level human perceptions of the technique's performance.  ... 
doi:10.1145/1067860.1067868 fatcat:zrkyacghsfdmzpn6zm7r442bke

Hints and Notions

1884 The Decorator and Furnisher  
When nearly dry wipe the high lights and sharp projections with a chamois dipped in the copper bronze.  ...  For the benefit of our lady friends we insert the follow ing simple recipe for whitening delicate silver articles: Boil tlem, until they are sufficiently cleansed, in a solution of. one part cream of tartar  ...  their truly artistic andsunique designs. performed, and evens then the delicate edges of T,, the plaster are apt to be rubbed and broken.  ... 

New frontiers in Numerical Relativity [article]

Miguel Zilhão
2013 arXiv   pre-print
We then present a dimensional reduction procedure that allows one to use existing numerical codes (with minor adaptations) to evolve higher-dimensional systems with enough symmetry, and show corresponding  ...  results obtained for five-dimensional head-on collisions of black holes.  ...  All numerical simulations that will be presented in subsequent chapters have been performed by adapting the Lean code [149] , initially designed for 3 + 1 vacuum spacetimes by U. Sperhake.  ... 
arXiv:1301.1509v1 fatcat:x2dt4kjlevandp5ibtrmbslx5u

The Growing Business Handbook:985The Growing Business Handbook: Strategies for Planning, Funding and Managing Business Growth. Kogan Page in association with KPMG and the CBI, £14.99

Richard Willsher, Adam Jolly
1998 Work Study  
Film production is a powerful example of this because it's so visible.  ...  Acknowledge the programme phase Sensitivity to the phase of the programme enables a large group to be clear about what needs to be done and who needs to take the lead.  ...  Effective, sound strategic procurement is one of the recipes for a successful business.  ... 
doi:10.1108/ws.1998. fatcat:jxoivywijfaltcrhwjs2cpdhqa

Under new ownership: privatizing China's state-owned enterprises

2006 ChoiceReviews  
That is a recipe for indefinite delay.  ...  with remarkable speed entered the technologically demanding international market for lower end routers.  ...  This is a book for all China watchers.  ... 
doi:10.5860/choice.43-6014 fatcat:rlmlzn3xvja5rkfgot7le6hnuy

Intelligent Computing Research Studies in Life Science

Dr. Thilagamani S
2019 International Journal of Pharma and Bio Sciences  
A new protocol for distributing the key has been introduced by Vijayakumar etal.  ...  This system provides end-to-end secure communication with high efficiency and low computational and communication overheads.  ...  The broadcasting [8] mechanism used for implement the communiqué stuck between the router areas.  ... 
doi:10.22376/ijpbs/10.sp01/oct/2019.1-142 fatcat:6fc5ghwmjbgrphetiablavajxm

Extractability and Chemical Forms of Radioactive Cesium in Designated Wastes Investigated in an On-Site Test [chapter]

Yoko Fujikawa, Hiroaki Ozaki, Xiaming Chen, Shogo Taniguchi, Ryouhei Takanami, Aiichiro Fujinaga, Shinji Sakurai, Paul Lewtas
2016 Radiological Issues for Fukushima's Revitalized Future  
Acknowledgments This work was partly supported by a study of the Health Effects of Radiation organized by the Ministry of Environment, Japan. The authors thank Mr.  ...  Takemi Nemoto (Odaka ward office) for his help in recruiting house owners for investigation and Ms. Eri Hayasaka for her assistance in this study.  ...  port of PC, a GPS unit, a laptop PC, and a mobile Wi-Fi router (Fig. 10.2) .  ... 
doi:10.1007/978-4-431-55848-4_9 fatcat:aytxxr4msff2fkgajdrc6hy4qa

Regulating next generation broadband

Ross Kelso
2008 Telecommunications Journal of Australia  
However, the effective speed for interacting with an Internet host depends not just on the performance of the local access link, but also on the backbone data network and the speed of data routers and  ...  application will not be made available unless a sufficient number of subscribers have broadband connections with performance high enough to support the application, yet service providers will not invest  ... 
doi:10.2104/tja08007 fatcat:lrzba6vfdfdhjfkqdrry4quhoa

Respublika! Experiments in the performance of participation and democracy

Ana Cristina Suzina
2019 Journal of alternative and community media  
Experiments in the performance of participation and democracy. Limassol, Cyprus: NeMe. ISBN 978-9963-9695-8-6, ebook, 380 p, Open Access.  ...  Participation as a design challenge has some sense of controversy in line with the above, as it assumes a role for 'process-designers' to outline an envisioned process configuration; a relation which most  ...  After review and editing, all students received one of their poems for their adaption and/or approval.  ... 
doi:10.1386/joacm_00053_5 fatcat:on5fel5tzbfwvbirajg2ezl5ym

Hacking Trademark Law for Collaborative Communities

Yana Welinder, Stephen LaPorte
2014 Social Science Research Network  
to or involvement in a project. 164 This strong sense of ownership, combined with a characteristic love for decentralization and a general distrust of authority, is a recipe for a tumultuous relationship  ...  Collaborative communities are unlikely to perform formal trademark clearance to determine whether the name or logo for their projects will be eligible for trademark protection.  ...  YES, but first… please sign a quick license for [insert community specific events, contests, and groups that only need to sign quick license to use community's trademarks (e.g. hackathon)]. or Get a regular  ... 
doi:10.2139/ssrn.2476779 fatcat:m7wqa2qxyrgvtj2yq4yd255vru
« Previous Showing results 1 — 15 out of 24 results