Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is in...
Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Al...
odel of Embodiment on Abstract Systems: from Hierarchy to Heterarchy Kohei Nakajima, Soya Shinkai, Takashi Ikegami A Behavior-Based Model of the Hydra, Phylum Cnidaria Malin Aktius...
A plethora of single-carrier and multi-carrier (MC) CDMA systems have been proposed recently to mitigate intersymbol interference (ISI) and eliminate multiuser interference (MUI). ...
Georgios B. Giannakis, Anastasios Stamoulis, Zheng...
The performance of Web servers and application servers is a crucial factor for the success of the underlying business activity. Current commercial servers (such as Apache and Micr...
Mohammad Shadi Al Hakeem, Jan Richling, Gero M&uum...
We propose Instruction-based Prediction as a means to optimize directory-based cache coherent NUMA shared-memory. Instruction-based prediction is based on observing the behavior o...