Sciweavers

1646 search results - page 285 / 330
» A genetic algorithm for designing distributed computer netwo...
Sort
View
128
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
128
Voted
SLIP
2009
ACM
15 years 10 months ago
Predicting the worst-case voltage violation in a 3D power network
This paper proposes an efficient method to predict the worst case of voltage violation by multi-domain clock gating in a three-dimensional (3D) on-chip power network considering l...
Wanping Zhang, Wenjian Yu, Xiang Hu, Amirali Shaya...
128
Voted
ICPADS
2007
IEEE
15 years 10 months ago
Federated clusters using the transparent remote Execution (TREx) environment
- Due to the increasing complexity of scientific models, large-scale simulation tools often require a critical amount of computational power to produce results in a reasonable amou...
Richert Wang, Enrique Cauich, Isaac D. Scherson
131
Voted
CGA
2008
15 years 3 months ago
Mobile 3D City Maps
ion and abstraction. By the end of the 20th century, technology had advanced to the point where computerized methods had revolutionized surveying and mapmaking practices. Now, the ...
Antti Nurminen
102
Voted
VRST
2006
ACM
15 years 9 months ago
Media productions for a dome display system
As the interest of the public for new forms of media grows, museums and theme parks select real time Virtual Reality productions as their presentation medium. Based on threedimens...
Athanasios Gaitatzes, Georgios Papaioannou, Dimitr...