Sciweavers

950 search results - page 177 / 190
» A New Direction for Computer Architecture Research
Sort
View
PCRCW
1997
Springer
13 years 11 months ago
ChaosLAN: Design and Implementation of a Gigabit LAN Using Chaotic Routing
In recent years, theChaos Project at theUniversityofWashingtonhas analyzed and simulated a dozen routing algorithms. Three new routing algorithms have been invented; of these, the...
Neil R. McKenzie, Kevin Bolding, Carl Ebeling, Law...
VLDB
1997
ACM
134views Database» more  VLDB 1997»
13 years 11 months ago
Spatial Joins Using R-trees: Breadth-First Traversal with Global Optimizations
R-tree based spatial join is useful because of both its superior performance and the wide spread implementation of R-trees. We present a new R-tree join method called BFRJ (Breadt...
Yun-Wu Huang, Ning Jing, Elke A. Rundensteiner
CCS
2006
ACM
13 years 11 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
AISS
2010
171views more  AISS 2010»
13 years 2 months ago
An Investigation into Influence Factor of Student Programming Grade Using Association Rule Mining
Computer programming is one of the most essential skills which each graduate has to acquire. However, there are reports that they are unable to write a program well. Researches in...
Mohamad Farhan Mohamad Mohsin, Mohd Helmy Abd Waha...
HPCA
2009
IEEE
14 years 8 months ago
Dacota: Post-silicon validation of the memory subsystem in multi-core designs
The number of functional errors escaping design verification and being released into final silicon is growing, due to the increasing complexity and shrinking production schedules ...
Andrew DeOrio, Ilya Wagner, Valeria Bertacco