• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,517,435
Next 10 →

Configurable Flow Control Mechanisms for Fault-Tolerant Routing*

by Binh Vien, Jose Duato, Sudhakar Yalamanchili, Facultad De Informatica - In Proceedings of the 22nd International Symposium on Computer Architecture , 1995
"... Fault-tolerant routing protocols in modern interconnection networks rely heavily on the network flow control mechanisms used. Optimistic flow control mechanisms such as wormhole routing (WR) realize very good performance, but are prone to deadlock in the presence of faults. Conservative flow control ..."
Abstract - Add to MetaCart
Fault-tolerant routing protocols in modern interconnection networks rely heavily on the network flow control mechanisms used. Optimistic flow control mechanisms such as wormhole routing (WR) realize very good performance, but are prone to deadlock in the presence of faults. Conservative flow

Token flow control

by Amit Kumar, et al.
"... As companies move towards many-core chips, an efficient onchip communication fabric to connect these cores assumes critical importance. To address limitations to wire delay scalability and increasing bandwidth demands, state-of-the-art on-chip networks use a modular packet-switched design with route ..."
Abstract - Cited by 627 (35 self) - Add to MetaCart
/delay. In this work, we propose token flow control (TFC), a flow control mechanism in which nodes in the network send out tokens in their local neighborhood to communicate information about their available resources. These tokens are then used in both routing and flow control: to choose less congested paths

Analysis of a Window-Based Flow Control Mechanism

by Based On Tcp, Keiichi Takagaki, Hiroyuki Ohsaki, Masayuki Murata - in TCP/IP networks,” 1999 IEEE International Conference on Control Applications , 2001
"... Another version of TCP called TCP Vegas has been proposed and studied in the literature. It can achieve better performance than the current TCP Reno. In our previous studies, steady-state behavior of a windowbased flow control mechanism based on TCP Vegas has been analyzed for a simple network topol ..."
Abstract - Add to MetaCart
Another version of TCP called TCP Vegas has been proposed and studied in the literature. It can achieve better performance than the current TCP Reno. In our previous studies, steady-state behavior of a windowbased flow control mechanism based on TCP Vegas has been analyzed for a simple network

Optimization Flow Control, I: Basic Algorithm and Convergence

by Steven H. Low, David E. Lapsley - IEEE/ACM TRANSACTIONS ON NETWORKING , 1999
"... We propose an optimization approach to flow control where the objective is to maximize the aggregate source utility over their transmission rates. We view network links and sources as processors of a distributed computation system to solve the dual problem using gradient projection algorithm. In thi ..."
Abstract - Cited by 690 (64 self) - Add to MetaCart
We propose an optimization approach to flow control where the objective is to maximize the aggregate source utility over their transmission rates. We view network links and sources as processors of a distributed computation system to solve the dual problem using gradient projection algorithm

JFlow: Practical Mostly-Static Information Flow Control

by Andrew C. Myers - In Proc. 26th ACM Symp. on Principles of Programming Languages (POPL , 1999
"... A promising technique for protecting privacy and integrity of sensitive data is to statically check information flow within programs that manipulate the data. While previous work has proposed programming language extensions to allow this static checking, the resulting languages are too restrictive f ..."
Abstract - Cited by 579 (32 self) - Add to MetaCart
models: a decentralized label model, label polymorphism, run-time label checking, and automatic label inference. JFlow also supports many language features that have never been integrated successfully with static information flow control, including objects, subclassing, dynamic type tests, access control

A Lattice Model of Secure Information Flow

by Dorothy E. Denning , 1976
"... This paper investigates mechanisms that guarantee secure information flow in a computer system. These mechanisms are examined within a mathematical framework suitable for formulating the requirements of secure information flow among security classes. The central component of the model is a lattice s ..."
Abstract - Cited by 697 (2 self) - Add to MetaCart
This paper investigates mechanisms that guarantee secure information flow in a computer system. These mechanisms are examined within a mathematical framework suitable for formulating the requirements of secure information flow among security classes. The central component of the model is a lattice

Certification of Programs for Secure Information Flow

by Dorothy E. Denning, Peter J. Denning , 1977
"... This paper presents a certification mechanism for verifying the secure flow of information through a program. Because it exploits the properties of a lattice structure among security classes, the procedure is sufficiently simple that it can easily be included in the analysis phase of most existing c ..."
Abstract - Cited by 488 (1 self) - Add to MetaCart
This paper presents a certification mechanism for verifying the secure flow of information through a program. Because it exploits the properties of a lattice structure among security classes, the procedure is sufficiently simple that it can easily be included in the analysis phase of most existing

Language-Based Information-Flow Security

by Andrei Sabelfeld , Andrew C. Myers - IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS , 2003
"... Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security policies such as confidentiality. An end-to-end confidentiality policy might assert that secret input data cannot be inferred by an attacker throug ..."
Abstract - Cited by 821 (57 self) - Add to MetaCart
through the attacker's observations of system output; this policy regulates information flow.

Costly search and mutual fund flows

by Erik R. Sirri, Peter Tufano - Journal of Finance , 1998
"... This paper studies the flows of funds into and out of equity mutual funds. Consumers base their fund purchase decisions on prior performance information, but do so asymmetrically, investing disproportionately more in funds that performed very well the prior period. Search costs seem to be an importa ..."
Abstract - Cited by 511 (5 self) - Add to MetaCart
This paper studies the flows of funds into and out of equity mutual funds. Consumers base their fund purchase decisions on prior performance information, but do so asymmetrically, investing disproportionately more in funds that performed very well the prior period. Search costs seem

Stability Analysis of Window-Based Flow Control Mechanism in TCP/IP Networks

by Hiroyuki Ohsaki Masayuki , 1999
"... Graduate Recently, a new version of the TCP mechanism, called TCP Vegas, is proposed, and has potential to achieve better performance than current mechanisms such as TCP Tahoe and Reno. This paper considers a windowbased flow control mechanism based on a slightly modified congestion avoidance mechan ..."
Abstract - Add to MetaCart
Graduate Recently, a new version of the TCP mechanism, called TCP Vegas, is proposed, and has potential to achieve better performance than current mechanisms such as TCP Tahoe and Reno. This paper considers a windowbased flow control mechanism based on a slightly modified congestion avoidance
Next 10 →
Results 1 - 10 of 3,517,435
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University