Sciweavers

6926 search results - page 76 / 1386
» A More Effective CEFF
Sort
View
HICSS
2006
IEEE
142views Biometrics» more  HICSS 2006»
14 years 4 months ago
Measuring the Effectiveness of Honeypot Counter-Counterdeception
Honeypots are computer systems that try to fool cyberattackers into thinking they are ordinary computer systems, when in fact they are designed solely to collect data about attack...
Neil C. Rowe
GLVLSI
2009
IEEE
112views VLSI» more  GLVLSI 2009»
14 years 4 months ago
The effect of design parameters on single-event upset sensitivity of MOS current mode logic
In this paper, we describe and discuss the effects of design parameters such as transistor size, output voltage swing and bias current on radiation sensitivity of MOS current mode...
Mahta Haghi, Jeff Draper
FGCN
2007
IEEE
111views Communications» more  FGCN 2007»
14 years 4 months ago
New Algorithm for Effective Utilization of Bandwidth for Sensitive Applications
In this paper, we propose an algorithm, which allocates the bandwidth in an effective manner for sensitive applications. The main idea of this work is to allocate more amount of b...
G. Varaprasad, R. S. D. Wahida Banu, Pallapa Venka...
SIGMOD
2002
ACM
188views Database» more  SIGMOD 2002»
14 years 10 months ago
COMMIX: towards effective web information extraction, integration and query answering
As WWW becomes more and more popular and powerful, how to search information on the web in database way becomes an important research topic. COMMIX, which is developed in the DB g...
Tengjiao Wang, Shiwei Tang, Dongqing Yang, Jun Gao...
ICCD
2008
IEEE
115views Hardware» more  ICCD 2008»
14 years 7 months ago
Techniques for increasing effective data bandwidth
—In this paper we examine techniques for increasing the effective bandwidth of the microprocessor offchip interconnect. We focus on mechanisms that are orthogonal to other techni...
Christopher Nitta, Matthew Farrens