Browsing LCS Technical Reports (1974 - 2003) by Title
Now showing items 1-20 of 671
-
2RegionRED: a Congestion Control Mechanism for the High Speed Internet
(2001-12)This thesis proposes a new Active Queue Management (AQM) scheme called 2RegionRED. It is superior to the classic Random Early Detection (RED) algorithm in that there is an intuitive way to set its parameters and it is ... -
Absenetee Computations in a Multiple-access Computer System
(1968-08)in multiple-access computer systems, emphasis is placed upon serving several interactive users simultaneously. However, many computations do not require user interaction, and user may therefore want to run these computations ... -
An Abstract Architecture for Parallel Graph Reduction
(1984-05)An implementation technique for functional languages that has received recent attention is graph reduction, which offers opportunity for the exploitation of parallelism by multiple processors. While several proposals for ... -
Abstract Data Types in Stack Based Languages
(1978-02)Abstract data types are the basis of an emerging methodology of computer programming. The only existing languages supporting abstract data types directly, CLU and Simula, both require compacting garbage collection, and ... -
An Abstract Implementation for a Generalized Data Flow Language
(1980-01)In this thesis we are concerned with issues arising from the need to achieve concurrency of operation with a computation on a large scale. Several factors contribute toward increasing interest in systems capable of exploiting ... -
An Abstract Model of a Research Institute: Simple Automatic Programming Approach
(1974-03)A problem of knowledge representation is considered in terms of designing a model for a simple sociological structure. A version of the access language is proposed which is based on three kind of expressions accepted by ... -
Abstract Model Specifications for Data Abstractions
(1979-07)A data abstraction introduces a data type with a hidden representation. Specifications of data abstractions are required to allow the data to be described and used without reference to the underlying representation. There ... -
Access-Controlled Resource Discovery for Pervasive Networks
(2002-09)Networks of the future will be characterized by a variety of computational devices that display a level of dynamism not seen in traditional wired networks. Because of the dynamic nature of these networks, resource discovery ... -
Actor Systems for Real-time Computation
(1978-03)Actor theory was invented by Hewitt and collaborators as a synthesis of many of the ideas from the high-level languages LISP, GEDANKEN, SMALLTALK, SIMULA-67, and others. Actor theory consists of a group of active objects ... -
Actors and Continuous Functionals
(1978-02)This paper presents precise versions of some "laws" that must be satisfied by computations involving communicating parallel processes. The laws take the form of stating plausible restrictions on the histories of computations ... -
Adaptively Secure Multi-party Computation
(1996-02)A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries (i.e., adversaries that may choose the corrupted parties during the course of the computation), in a setting where ... -
ADEPT: A Heuristic Program for Proving Theorems of Group Theory
(1966-10)A computer program, named ADEPT (A Distinctly Empirical Prover of Theorems), has been written which proves theorems taken from the abstract theory of groups. Its organization is basically heuristic, incorporating many ... -
Admission Control and Routing: Theory and Practice
(1995-06)Emerging high speed Broadband Integrated Services Digital Networks (B-ISDN) will carry traffic for services such as video-on-demand and video teleconferencing, which require resource reservation along the path on which the ... -
The AEGIS Processor Architecture for Tamper-Evident and Private Tamper-Resistant Processing
(2003-01)We describe the architecture of the AEGIS processor which can be used to build computing systems secure against both physical and software attacks. AEGIS assumes that the operating system and all components external to it, ... -
The AEGIS Processor Architecture for Tamper-Evident and Tamper-Resistant Processing
(2003)We describe the architecture of the AEGIS processor which can be used to build computing systems secure against both physical and software attacks. AEGIS assumes that the operating system and all components external to it, ... -
The AEGIS Processor Architecture for Tamper-Evident and Tamper-Resistant Processing
(2003)We describe the architecture for a single-chip AEGIS processor which can be used to build computing systems secure against both physical and software attacks. Our architecture assumes that all components external to the ... -
AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing
(2003)We describe the architecture for a single-chip AEGIS processor which can be used to build computing systems secure against both physical and software attacks. Our architecture assumes that all components external to the ... -
An Algorithm for Rate Allocation in a Packet-Switching Network With Feedback
(1994-04)As the speed and complexity of computer networks evolve, sharing network resources becomes increasingly important. thus, the issue of how to allocate the available bandwidth among the multitude of users needs to be ... -
Algorithmic issues in coding theory
(1997-10) -
Algorithms for Approximate Graph Coloring
(1991-06)