Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,109,810 papers from all fields of science
Search
Sign In
Create Free Account
Overhead (computing)
Known as:
Computational overhead
, Overhead
In computer science, overhead is any combination of excess or indirect computation time, memory, bandwidth, or other resources that are required to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
Algorithm
Algorithmic efficiency
BareMetal
Block (data storage)
Expand
Broader (1)
Software engineering
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2014
Review
2014
Managing Performance Overhead of Virtual Machines in Cloud Computing: A Survey, State of the Art, and Future Directions
Fei Xu
,
Fangming Liu
,
Hai Jin
,
A. Vasilakos
Proceedings of the IEEE
2014
Corpus ID: 8336222
Infrastructure-as-a-Service (IaaS) cloud computing offers customers (tenants) a scalable and economical way to provision virtual…
Expand
Highly Cited
2010
Highly Cited
2010
Lightweight DDoS flooding attack detection using NOX/OpenFlow
Rodrigo Braga
,
E. Mota
,
A. Passito
IEEE Local Computer Network Conference
2010
Corpus ID: 1263511
Distributed denial-of-service (DDoS) attacks became one of the main Internet security problems over the last decade, threatening…
Expand
Highly Cited
2005
Highly Cited
2005
A pairwise key predistribution scheme for wireless sensor networks
Wenliang Du
,
Jing Deng
,
Y. Han
,
P. Varshney
,
Jonathan Katz
,
A. Khalili
TSEC
2005
Corpus ID: 322354
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent between…
Expand
Highly Cited
2004
Highly Cited
2004
TinySec: a link layer security architecture for wireless sensor networks
Chris Karlof
,
N. Sastry
,
D. Wagner
ACM International Conference on Embedded…
2004
Corpus ID: 7438327
We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design…
Expand
Highly Cited
2004
Highly Cited
2004
A wireless sensor network For structural monitoring
N. Xu
,
Sumit Rangwala
,
+4 authors
D. Estrin
ACM International Conference on Embedded…
2004
Corpus ID: 1379954
Structural monitoring---the collection and analysis of structural response to ambient or forced excitation--is an important…
Expand
Highly Cited
2003
Highly Cited
2003
Establishing pairwise keys in distributed sensor networks
Donggang Liu
,
P. Ning
Conference on Computer and Communications…
2003
Corpus ID: 1535984
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely…
Expand
Highly Cited
2003
Highly Cited
2003
A pairwise key pre-distribution scheme for wireless sensor networks
Wenliang Du
,
Jing Deng
,
Y. Han
,
P. Varshney
Conference on Computer and Communications…
2003
Corpus ID: 9252244
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among…
Expand
Highly Cited
2003
Highly Cited
2003
Regulations, Market Structure, Institutions, and the Cost of Financial Intermediation
A. Demirguc-Kunt
,
L. Laeven
,
R. Levine
2003
Corpus ID: 8625028
This paper examines the impact of bank regulations, market structure, and national institutions on bank net interest margins and…
Expand
Highly Cited
2000
Highly Cited
2000
Efficient authentication and signing of multicast streams over lossy channels
A. Perrig
,
R. Canetti
,
Z. J. D. Tygar
,
D. Song
,
Uc Berkeley
,
I. T. Watson
Proceeding IEEE Symposium on Security and…
2000
Corpus ID: 1811563
Multicast stream authentication and signing is an important and challenging problem. Applications include the continuous…
Expand
Highly Cited
1995
Highly Cited
1995
Abstractions for Software Architecture and Tools to Support Them
M. Shaw
,
R. Deline
,
D. Klein
,
T. Ross
,
D. Young
,
G. Zelesnik
IEEE Trans. Software Eng.
1995
Corpus ID: 1524461
Architectures for software use rich abstractions and idioms to describe system components, the nature of interactions among the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE