Sciweavers

11384 search results - page 2131 / 2277
» Achieved IPC Performance
Sort
View
IPPS
2005
IEEE
14 years 3 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
14 years 3 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
MICRO
2005
IEEE
130views Hardware» more  MICRO 2005»
14 years 3 months ago
Exploiting Vector Parallelism in Software Pipelined Loops
An emerging trend in processor design is the addition of short vector instructions to general-purpose and embedded ISAs. Frequently, these extensions are employed using traditiona...
Samuel Larsen, Rodric M. Rabbah, Saman P. Amarasin...
MSS
2005
IEEE
62views Hardware» more  MSS 2005»
14 years 3 months ago
Predictive Reduction of Power and Latency (PuRPLe)
Increasing efforts have been aimed towards the management of power as a critical system resource, and the disk can consume approximately a third of the power required for a typica...
Matthew Craven, Ahmed Amer
SSDBM
2005
IEEE
100views Database» more  SSDBM 2005»
14 years 3 months ago
An Information Theoretic Model for Database Alignment
As with many large organizations, the Government's data is split in many different ways and is collected at different times by different people. The resulting massive data he...
Patrick Pantel, Andrew Philpot, Eduard H. Hovy
« Prev « First page 2131 / 2277 Last » Next »