Search
Now showing items 51-60 of 79
Service Identification in TCP/IP: Well-Known versus Random Port Numbers
(2006-01-11)
The sixteen-bit well-known port number is often overlooked as a network identifier in Internet communications. Its purpose at the most fundamental level is only to demultiplex flows of traffic. Several unintended uses of ...
Ubiquitous Memory Introspection (Preliminary Manuscript)
(2006-09-25)
Modern memory systems play a critical role in the performance ofapplications, but a detailed understanding of the application behaviorin the memory system is not trivial to attain. It requires timeconsuming simulations of ...
Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version)
(2006-09-11)
A trusted monotonic counter is a valuable primitive thatenables a wide variety of highly scalable offlineand decentralized applications that would otherwise be prone to replay attacks, including offline payment, e-wallets, ...
Programming a Sensor Network as an Amorphous Medium
(2006-06)
In many sensor network applications, the network is deployedto approximate a physical space. The network itself is not ofinterest: rather, we are interested in measuring the propertiesof the space it fills, and of establishing ...
Optimal Rates for Regularization Operators in Learning Theory
(2006-09-10)
We develop some new error bounds for learning algorithms induced by regularization methods in the regression setting. The "hardness" of the problem is characterized in terms of the parameters r and s, the first related ...
Combined static and dynamic mutability analysis
(2006-09-17)
Knowing which method parameters may be mutated during a method'sexecution is useful for many software engineering tasks. We presentan approach to discovering parameter immutability, in which severallightweight, scalable ...
Refactoring for parameterizing Java classes
(2006-09-05)
Type safety and expressiveness of many existing Java libraries and theirclient applications would improve, if the libraries were upgraded to definegeneric classes. Efficient and accurate tools exist to assist clientapplications ...
Adaptation for Regularization Operators in Learning Theory
(2006-09-10)
We consider learning algorithms induced by regularization methods in the regression setting. We show that previously obtained error bounds for these algorithms using a-priori choices of the regularization parameter, can ...
RingScalar: A Complexity-Effective Out-of-Order Superscalar Microarchitecture
(2006-09-18)
RingScalar is a complexity-effective microarchitecture for out-of-order superscalar processors, that reduces the area, latency, and power of all major structures in the instruction flow. The design divides an N-way ...
The Design of a Relational Engine
(2006-09-29)
The key design challenges in the construction of a SAT-based relational engine are described, and novel techniques are proposed to address them. An efficient engine must have a mechanism for specifying partial solutions, ...