-
1
-
-
84880084057
-
Power containers: An OS facility for-ne-grained power and energy management on multicore servers
-
K. Shen, A. Shriraman, S. Dwarkadas, X. Zhang, and Z. Chen, "Power containers: An OS facility for-ne-grained power and energy management on multicore servers," in Proc. ACM Int. Conf. Archit. Support Program. Lang. Oper. Syst. (ASPLOS), 2013, pp. 65-76
-
(2013)
Proc. ACM Int. Conf. Archit. Support Program. Lang. Oper. Syst. (ASPLOS)
, pp. 65-76
-
-
Shen, K.1
Shriraman, A.2
Dwarkadas, S.3
Zhang, X.4
Chen, Z.5
-
2
-
-
79953071808
-
MemScale: Active low-power modes for main memory
-
Q. Deng, D. Meisner, L. Ramos, T. F. Wenisch, and R. Bianchini, "MemScale: Active low-power modes for main memory," in Proc. ACM Int. Conf. Archit. Support Program. Lang. Oper. Syst. (ASPLOS), 2011, pp. 225-238
-
(2011)
Proc. ACM Int. Conf. Archit. Support Program. Lang. Oper. Syst. (ASPLOS)
, pp. 225-238
-
-
Deng, Q.1
Meisner, D.2
Ramos, L.3
Wenisch, T.F.4
Bianchini, R.5
-
3
-
-
84860588880
-
Where is the energy spent inside my app?: Fine grained energy accounting on smartphones with Eprof
-
A. Pathak, Y. C. Hu, and M. Zhang, "Where is the energy spent inside my app?: Fine grained energy accounting on smartphones with Eprof," in Proc. ACM Eur. Conf. Comput. Syst. (EuroSys), 2012, pp. 29-42
-
(2012)
Proc. ACM Eur. Conf. Comput. Syst. (EuroSys)
, pp. 29-42
-
-
Pathak, A.1
Hu, Y.C.2
Zhang, M.3
-
5
-
-
51849138756
-
An architecture for exploiting multi-core processors to parallelize network intrusion prevention
-
Apr./May
-
V. Paxson, R. Sommer, and N. Weaver, "An architecture for exploiting multi-core processors to parallelize network intrusion prevention," in Proc. IEEE Sarnoff Symp., Apr./May 2007, pp. 1-7
-
(2007)
Proc. IEEE Sarnoff Symp
, pp. 1-7
-
-
Paxson, V.1
Sommer, R.2
Weaver, N.3
-
6
-
-
84948431640
-
Stateful intrusion detection for high-speed networks
-
May
-
C. Kruegel, F. Valeur, G. Vigna, and R. Kemmerer, "Stateful intrusion detection for high-speed networks," in Proc. IEEE Symp. Secur. Privacy, May 2002, pp. 285-293
-
(2002)
Proc. IEEE Symp. Secur. Privacy
, pp. 285-293
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
Kemmerer, R.4
-
7
-
-
38149024764
-
The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware
-
M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney, "The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware," in Proc. Int. Symp. Recent Adv. Intrusion Detec-tion (RAID), 2007, pp. 107-126
-
(2007)
Proc. Int. Symp. Recent Adv. Intrusion Detec-tion (RAID)
, pp. 107-126
-
-
Vallentin, M.1
Sommer, R.2
Lee, J.3
Leres, C.4
Paxson, V.5
Tierney, B.6
-
9
-
-
84963738059
-
-
Snort Active Response. [Online]. Available: http://manual.snort.org/node26.html
-
-
-
-
10
-
-
14844312929
-
Operational experi-ences with high-volume network intrusion detection
-
H. Dreger, A. Feldmann, V. Paxson, and R. Sommer, "Operational experi-ences with high-volume network intrusion detection," in Proc. ACM Conf. Comput. Commun. Secur. (CCS), 2004, pp. 2-11
-
(2004)
Proc. ACM Conf. Comput. Commun. Secur. (CCS)
, pp. 2-11
-
-
Dreger, H.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
-
12
-
-
78650853973
-
High speed network traf-c analysis with com-modity multi-core systems
-
F. Fusco and L. Deri, "High speed network traf-c analysis with com-modity multi-core systems," in Proc. ACM SIGCOMM Conf. Internet Meas. (IMC), 2010, pp. 218-224
-
(2010)
Proc. ACM SIGCOMM Conf. Internet Meas. (IMC)
, pp. 218-224
-
-
Fusco, F.1
Deri, L.2
-
14
-
-
84963732423
-
-
Intel. (2011). 82599 10 GbE Controller Datasheet. [Online]. Available: http://download.intel.com/design/network/datashts/82599-datasheet.pdf
-
(2011)
82599 10 GbE Controller Datasheet
-
-
-
15
-
-
85084096732
-
An empirical study of real-world polymorphic code injection attacks
-
M. Polychronakis, K. G. Anagnostakis, and E. P. Markatos, "An empirical study of real-world polymorphic code injection attacks," in Proc. USENIX Workshop Large-Scale Exploits Emergent Threats (LEET), 2009, p. 9
-
(2009)
Proc. USENIX Workshop Large-Scale Exploits Emergent Threats (LEET)
, pp. 9
-
-
Polychronakis, M.1
Anagnostakis, K.G.2
Markatos, E.P.3
-
16
-
-
84919438878
-
Tolerating overload attacks against packet capturing systems
-
A. Papadogiannakis, M. Polychronakis, and E. P. Markatos, "Tolerating overload attacks against packet capturing systems," in Proc. USENIX Annu. Tech. Conf. (ATC), 2012, p. 18
-
(2012)
Proc. USENIX Annu. Tech. Conf. (ATC)
, pp. 18
-
-
Papadogiannakis, A.1
Polychronakis, M.2
Markatos, E.P.3
-
17
-
-
77952346235
-
Improv-ing the accuracy of network intrusion detection systems under load using selective packet discarding
-
A. Papadogiannakis, M. Polychronakis, and E. P. Markatos, "Improv-ing the accuracy of network intrusion detection systems under load using selective packet discarding," in Proc. ACM Eur. Workshop Syst. Secur. (EUROSEC), 2010, pp. 15-21
-
(2010)
Proc. ACM Eur. Workshop Syst. Secur. (EUROSEC)
, pp. 15-21
-
-
Papadogiannakis, A.1
Polychronakis, M.2
Markatos, E.P.3
-
18
-
-
79960605388
-
Improving the performance of intrusion detection using dialog-based payload aggregation
-
Apr
-
T. Limmer and F. Dressler, "Improving the performance of intrusion detection using dialog-based payload aggregation," in Proc. IEEE Global Internet Symp. (GI), Apr. 2011, pp. 822-827
-
(2011)
Proc. IEEE Global Internet Symp. (GI)
, pp. 822-827
-
-
Limmer, T.1
Dressler, F.2
-
19
-
-
65249091864
-
Enriching network security analysis with time travel
-
G. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson, and F. Schneider, "Enriching network security analysis with time travel," in Proc. ACM SIGCOMM Conf. Data Commun., 2008, pp. 183-194
-
(2008)
Proc. ACM SIGCOMM Conf. Data Commun
, pp. 183-194
-
-
Maier, G.1
Sommer, R.2
Dreger, H.3
Feldmann, A.4
Paxson, V.5
Schneider, F.6
-
22
-
-
67650783130
-
PowerNap: Eliminating server idle power
-
D. Meisner, B. T. Gold, and T. F.Wenisch, "PowerNap: Eliminating server idle power," in Proc. ACM Int. Conf. Archit. Support Program. Lang. Oper. Syst. (ASPLOS), 2009, pp. 205-216
-
(2009)
Proc. ACM Int. Conf. Archit. Support Program. Lang. Oper. Syst. (ASPLOS)
, pp. 205-216
-
-
Meisner, D.1
Gold, B.T.2
Wenisch, T.F.3
-
23
-
-
85092010360
-
Reducing network energy consumption via sleeping and rate-adaptation
-
S. Nedevschi, L. Popa, G. Iannaccone, S. Ratnasamy, and D. Wetherall, "Reducing network energy consumption via sleeping and rate-adaptation," in Proc. USENIX Symp. Netw. Syst. Design Implement. (NSDI), 2008, pp. 323-336
-
(2008)
Proc. USENIX Symp. Netw. Syst. Design Implement. (NSDI)
, pp. 323-336
-
-
Nedevschi, S.1
Popa, L.2
Iannaccone, G.3
Ratnasamy, S.4
Wetherall, D.5
-
24
-
-
84936862880
-
Building a power-proportional software router
-
L. Niccolini, G. Iannaccone, S. Ratnasamy, J. Chandrashekar, and L. Rizzo, "Building a power-proportional software router," in Proc. USENIX Annu. Tech. Conf. (ATC), 2012, p. 8
-
(2012)
Proc. USENIX Annu. Tech. Conf. (ATC)
, pp. 8
-
-
Niccolini, L.1
Iannaccone, G.2
Ratnasamy, S.3
Chandrashekar, J.4
Rizzo, L.5
-
26
-
-
77953299514
-
Optimizing throughput and latency under given power budget for network packet processing
-
Mar
-
J. Kuang and L. Bhuyan, "Optimizing throughput and latency under given power budget for network packet processing," in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), Mar. 2010, pp. 1-9
-
(2010)
Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM)
, pp. 1-9
-
-
Kuang, J.1
Bhuyan, L.2
-
27
-
-
8344239614
-
Energy-latency tradeoffs for data gathering in wireless sensor networks
-
Mar
-
Y. Yu, B. Krishnamachari, and V. K. Prasanna, "Energy-latency tradeoffs for data gathering in wireless sensor networks," in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), Mar. 2004, p. 255
-
(2004)
Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM)
, pp. 255
-
-
Yu, Y.1
Krishnamachari, B.2
Prasanna, V.K.3
-
28
-
-
34548393073
-
An adaptive energy-ef-cient and low-latency MAC for tree-based data gathering in sensor networks
-
Sep
-
G. Lu, B. Krishnamachari, and C. S. Raghavendra, "An adaptive energy-ef-cient and low-latency MAC for tree-based data gathering in sensor networks," Wireless Commun. Mobile Comput., vol. 7, no. 7, pp. 863-875, Sep. 2007
-
(2007)
Wireless Commun. Mobile Comput
, vol.7
, Issue.7
, pp. 863-875
-
-
Lu, G.1
Krishnamachari, B.2
Raghavendra, C.S.3
-
29
-
-
84860596665
-
Improving net-work connection locality on multicore systems
-
A. Pesterev, J. Strauss, N. Zeldovich, and R. T. Morris, "Improving net-work connection locality on multicore systems," in Proc. ACM Eur. Conf. Comput. Syst. (EuroSys), 2012, pp. 337-350
-
(2012)
Proc. ACM Eur. Conf. Comput. Syst. (EuroSys)
, pp. 337-350
-
-
Pesterev, A.1
Strauss, J.2
Zeldovich, N.3
Morris, R.T.4
-
30
-
-
84871288362
-
MCA2: Multi-core architecture for mitigating complexity attacks
-
Oct
-
Y. Afek, A. Bremler-Barr, Y. Harchol, D. Hay, and Y. Koral, "MCA2: Multi-core architecture for mitigating complexity attacks," in Proc. ACM/IEEE Symp. Archit. Netw. Commun. Syst. (ANCS), Oct. 2012, pp. 235-246
-
(2012)
Proc. ACM/IEEE Symp. Archit. Netw. Commun. Syst. (ANCS)
, pp. 235-246
-
-
Afek, Y.1
Bremler-Barr, A.2
Harchol, Y.3
Hay, D.4
Koral, Y.5
|