Results 1 - 10
of
209
Visualising the Berkeley Sockets API
"... The Berkeley Sockets API is a library of functions, macros and data structures that allows a program to create and manage communication streams between two or more processes on the same machine, or across a network of machines. The API is the main method in which programs communicate with the operat ..."
Abstract
- Add to MetaCart
The Berkeley Sockets API is a library of functions, macros and data structures that allows a program to create and manage communication streams between two or more processes on the same machine, or across a network of machines. The API is the main method in which programs communicate
XenSocket: A high-throughput interdomain transport for VMs
, 2007
"... Abstract. This paper presents the design and implementation of XenSocket, a UNIX-domain-socket-like construct for high-throughput interdomain (VM-to-VM) communication on the same system. The design of XenSocket replaces the Xen page-flipping mechanism with a static circular memory buffer shared betw ..."
Abstract
-
Cited by 61 (0 self)
- Add to MetaCart
on multiple network packets into one or more large operations on the shared buffer. While the reference implementation (and name) of XenSocket is written against the Xen virtual machine monitor, the principle behind XenSocket applies broadly across the field of virtual machines. Key words: shared-memory IPC
Fast Networking with Socket-Outsourcing in Hosted Virtual Machine Environments
"... This paper proposes a novel method of achieving fast networking in hosted virtual machine (VM) environments. This method, called socket-outsourcing, replaces the socket layer in a guest operating system (OS) with the socket layer of the host OS. Socket-outsourcing increases network performance by el ..."
Abstract
-
Cited by 5 (2 self)
- Add to MetaCart
This paper proposes a novel method of achieving fast networking in hosted virtual machine (VM) environments. This method, called socket-outsourcing, replaces the socket layer in a guest operating system (OS) with the socket layer of the host OS. Socket-outsourcing increases network performance
1 Characterizing the Performance of Parallel Applications on Multi-Socket Virtual Machines
"... Abstract—In this paper we characterize the behavior with respect to memory locality management of scientific computing applications running in virtualized environments. NUMA locality on current solutions (KVM and Xen) is enforced by pinning virtual machines to CPUs and providing NUMA aware allocatio ..."
Abstract
- Add to MetaCart
the programming model allows it, system partitioning with proper VM and runtime support is able to re-produce native performance: in a partitioned system with one virtual machine per socket the average workload performance is 5 % better than native. I.
Static structural testing of trans-tibial composite sockets
, 1999
"... Abstract The purpose of this investigation was to quantify the structural strength of various transtibial composite sockets. To conduct the study, loading parameters and methods were developed that emulate the International Standards Organisation (ISO) standards for structural testing of lower limb ..."
Abstract
- Add to MetaCart
reinforcement materials and two resin types were used to construct the sockets. A standard four hole distal attachment plate was used to connect the socket and pylon. Each sample was loaded to failure in a servo-hydraulic materials test machine at 100 N/s.
Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds
- In 2nd Symposium on Networked Systems Design and Implementation (NSDI
, 2005
"... Abstract – Recent denial of service attacks are mounted by professionals using Botnets of tens of thousands of compromised machines. To circumvent detection, attackers are increasingly moving away from bandwidth floods to attacks that mimic the Web browsing behavior of a large number of clients, and ..."
Abstract
-
Cited by 153 (1 self)
- Add to MetaCart
Abstract – Recent denial of service attacks are mounted by professionals using Botnets of tens of thousands of compromised machines. To circumvent detection, attackers are increasingly moving away from bandwidth floods to attacks that mimic the Web browsing behavior of a large number of clients
ABSTRACT SmartSockets: Solving the Connectivity Problems in Grid Computing
"... Tightly coupled parallel applications are increasingly run in Grid environments. Unfortunately, on many Grid sites the ability of machines to create or accept network connections is severely limited by firewalls, network address translation (NAT) or non-routed networks. Multi homing further complica ..."
Abstract
- Add to MetaCart
complicates connection setup and machine identification. Although ad-hoc solutions exist for some of these problems, it is usually up to the application’s user to discover the cause of the connectivity problems and find a solution. In this paper we describe SmartSockets, 1 a communication library that lifts
ABSTRACT SmartSockets: Solving the Connectivity Problems in Grid Computing
"... Tightly coupled parallel applications are increasingly run in Grid environments. Unfortunately, on many Grid sites the ability of machines to create or accept network connections is severely limited by firewalls, network address translation (NAT) or non-routed networks. Multi homing further complica ..."
Abstract
- Add to MetaCart
complicates connection setup and machine identification. Although ad-hoc solutions exist for some of these problems, it is usually up to the application’s user to discover the cause of the connectivity problems and find a solution. In this paper we describe SmartSockets, 1 a communication library that lifts
Using JavaNws to Compare C and Java TCP-Socket Performance
- In The Journal of Concurrency and Computation: Practice and Experience
, 2000
"... As research and implementation continue to facilitate high performance computing in Java, applications can benefit from resource management and prediction tools. In this work, we present such a tool for network round trip time and bandwidth between a user's desktop and any machine running a ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
As research and implementation continue to facilitate high performance computing in Java, applications can benefit from resource management and prediction tools. In this work, we present such a tool for network round trip time and bandwidth between a user's desktop and any machine running a
Prosthetic Limb–Body Interface: Overview of the Prosthetic Socket Development
"... Research Projects Agency task targeted at developing a neurally controlled upper-extremity prosthetic limb for the wounded warrior population that would incorporate and emulate, from the shoulder joint through the fingertips, the full 22 degrees of freedom possessed by the biologic arm. This review ..."
Abstract
- Add to MetaCart
will give a brief background of upper-limb prosthetics and the impact currently insufficient technology has on both the military and civilian sectors. It then highlights the most novel socket concepts, prototypes, and socket accessory tool designs developed to support the Revo-lutionizing Prosthetics 2009
Results 1 - 10
of
209