咨询与建议

限定检索结果

文献类型

  • 40 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 41 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 10 篇 计算机科学与技术...
    • 7 篇 信息与通信工程
    • 4 篇 软件工程
    • 3 篇 电气工程
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 4 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 海洋科学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 2 篇 cloud
  • 2 篇 security
  • 2 篇 availability
  • 1 篇 sensor nodes
  • 1 篇 vpki
  • 1 篇 networked contro...
  • 1 篇 information syst...
  • 1 篇 reliability
  • 1 篇 scalability
  • 1 篇 adaptive sensor ...
  • 1 篇 approximation al...
  • 1 篇 supervision
  • 1 篇 smartphones
  • 1 篇 peer to peer com...
  • 1 篇 task analysis
  • 1 篇 micro-service
  • 1 篇 application soft...
  • 1 篇 vehicle detectio...
  • 1 篇 real time system...
  • 1 篇 identity and cre...

机构

  • 2 篇 university of sc...
  • 2 篇 singapore univer...
  • 2 篇 microsoft
  • 2 篇 uc berkeley
  • 2 篇 microsoft resear...
  • 1 篇 computer science...
  • 1 篇 dropbox
  • 1 篇 the national sch...
  • 1 篇 faculty of infor...
  • 1 篇 university of ca...
  • 1 篇 nanyang technol ...
  • 1 篇 dept. of electri...
  • 1 篇 intel labs
  • 1 篇 microsoft resear...
  • 1 篇 dept. of enginee...
  • 1 篇 college of infor...
  • 1 篇 usc information ...
  • 1 篇 university of ca...
  • 1 篇 natl univ singap...
  • 1 篇 university of ca...

作者

  • 1 篇 p. brighten godf...
  • 1 篇 keith winstein
  • 1 篇 he jheng-jhan
  • 1 篇 fan chih-peng
  • 1 篇 rachid guerraoui
  • 1 篇 khodaei mohammad
  • 1 篇 bin hu
  • 1 篇 tua a. tamba
  • 1 篇 asma ben mansour
  • 1 篇 p. tupec
  • 1 篇 chitra muthukris...
  • 1 篇 gerald q. maguir...
  • 1 篇 robert ricci
  • 1 篇 hongze zhao
  • 1 篇 varadharajan vij...
  • 1 篇 eric brewer
  • 1 篇 emin gün sirer
  • 1 篇 philip levis
  • 1 篇 chabir alaa
  • 1 篇 liang he

语言

  • 41 篇 英文
检索条件"任意字段=Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation"
41 条 记 录,以下是1-10 订阅
排序:
VLSI implementation of K-Best MIMO Detector with Cost-Effective Pre-screening and Fast Sorting design  22nd
VLSI Implementation of K-Best MIMO Detector with Cost-Effect...
收藏 引用
11th International conference on Intelligent Networking and Collaborative systems (INCoS) / 22nd International conference on Network-Based Information systems (NBiS)
作者: He, Jheng-Jhan Fan, Chih-Peng Natl Chung Hsing Univ Dept Elect Engn Taichung 402 Taiwan
For MIMO detections, the K-Best algorithm has been widely applied for multiple-antenna wireless communications. In this paper, to raise the throughput by the cost-effective architecture, the efficient pre-screening an... 详细信息
来源: 评论
Aragog: scalable runtime verification of shardable networked systems  20
Aragog: scalable runtime verification of shardable networked...
收藏 引用
proceedings of the 14th usenix conference on Operating systems design and implementation
作者: Nofel Yaseen Behnaz Arzani Ryan Beckett Selim Ciraci Vincent Liu University of Pennsylvania Microsoft Research Microsoft
Network functions like firewalls, proxies, and NATs are instances of distributed systems that lie on the critical path for a substantial fraction of today's cloud applications. Unfortunately, validating these syst...
来源: 评论
A high-speed load-balancer design with guaranteed per-connection-consistency  20
A high-speed load-balancer design with guaranteed per-connec...
收藏 引用
proceedings of the 17th usenix conference on networked systems design and implementation
作者: Tom Barbette Chen Tang Haoran Yao Dejan Kostić Gerald Q. Maguire Panagiotis Papadimitratos Marco Chiesa KTH Royal Institute of Technology
Large service providers use load balancers to dispatch millions of incoming connections per second towards thousands of servers. there are two basic yet critical requirements for a load balancer: uniform load distribu...
来源: 评论
DEMO: VPKIaaS: A Highly-Available and Dynamically-Scalable Vehicular Public-Key Infrastructure  11
DEMO: VPKIaaS: A Highly-Available and Dynamically-Scalable V...
收藏 引用
11th ACM conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
作者: Noroozi, Hamid Khodaei, Mohammad Papadimitratos, Panos KTH Networked Syst Secur Grp Stockholm Sweden
the central building block of secure and privacy-preserving Vehicular Communication (VC) systems is a Vehicular Public-Key Infrastructure (VPKI), which provides vehicles with multiple anonymized credentials, termed ps... 详细信息
来源: 评论
VPKIaaS: A Highly-Available and Dynamically-Scalable Vehicular Public-Key Infrastructure  18
VPKIaaS: A Highly-Available and Dynamically-Scalable Vehicul...
收藏 引用
proceedings of the 11th ACM conference on Security & Privacy in Wireless and Mobile Networks
作者: Hamid Noroozi Mohammad Khodaei Panos Papadimitratos Networked Systems Security Group KTH Stockholm Sweden
the central building block of secure and privacy-preserving Vehicular Communication (VC) systems is a Vehicular Public-Key Infrastructure (VPKI), which provides vehicles with multiple anonymized credentials, termed ps... 详细信息
来源: 评论
Resilient Control Under Denial-of-Service via Dynamic Event Triggering  11
Resilient Control Under Denial-of-Service via Dynamic Event ...
收藏 引用
11th Asian Control conference (ASCC)
作者: Tamba, Tua A. Nazaruddin, Yul Y. Hu, Bin Parahyangan Catholic Univ Dept Elect Engn Mechatron Bandung Indonesia Inst Teknol Bandung Instrumentat & Control Res Grp Bandung Indonesia Old Dominion Univ Dept Engn Technol Norfolk VA 23529 USA
networked control systems (NCS) typically utilize networks of computers and communication links to automatically monitor and manage the plant-sensor-controller-actuator interactions and data exchanges. One important i... 详细信息
来源: 评论
the design, implementation, and deployment of a system to transparently compress hundreds of petabytes of image files for a file-storage service  17
The design, implementation, and deployment of a system to tr...
收藏 引用
proceedings of the 14th usenix conference on networked systems design and implementation
作者: Daniel Reiter Horn Ken Elkabany Chris Lesniewski-Laas Keith Winstein Dropbox Stanford University
We report the design, implementation, and deployment of Lepton, a fault-tolerant system that losslessly compresses JPEG images to 77% of their original size on average. Lepton replaces the lowest layer of baseline JPE...
来源: 评论
Resilient Control Under Denial-of-Service via Dynamic Event Triggering
Resilient Control Under Denial-of-Service via Dynamic Event ...
收藏 引用
Asian Control conference
作者: Tua A. Tamba Yul Y. Nazaruddin Bin Hu Dept. of Electrical Engineering (Mechatronics) Parahyangan Catholic University Indonesia Instrumentation & Control Research Group Inetitut Teknologi Bandung Indonesia Dept. of Engineering Technology Old Dominion University Norfolk VA USA
networked control systems (NCS) typically utilize networks of computers and communication links to automatically monitor and manage the plant-sensor-controller-actuator interactions and data exchanges. One important i... 详细信息
来源: 评论
implementation and application of underwater acoustic sensor nodes  11
Implementation and application of underwater acoustic sensor...
收藏 引用
11th ACM International conference on Underwater Networks and systems, WUWNet 2016
作者: Chen, Huifang Zhang, Ying Chen, Zhongyue Xu, Wen College of Information Science and Electronic Engineering Zhejiang University Hangzhou310027 China
Underwater sensing is envisioned using inexpensive underwater sensor nodes distributed over a wide area, deployed close to the bottom, and networked through underwater acoustic communications. In this paper, an underw... 详细信息
来源: 评论
proceedings of the 11th usenix Symposium on networked systems design and implementation, NSDI 2014
Proceedings of the 11th USENIX Symposium on Networked System...
收藏 引用
11th usenix Symposium on networked systems design and implementation, NSDI 2014
the proceedings contain 38 papers. the topics discussed include: catch the whole lot in an action: rapid precise packet loss notification in data center;high throughput data center topology design;adtributor: revenue ...
来源: 评论