Sciweavers

6284 search results - page 1243 / 1257
» An evaluation of Bradfordizing effects
Sort
View
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 5 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
ICS
2009
Tsinghua U.
13 years 5 months ago
Refereeing conflicts in hardware transactional memory
In the search for high performance, most transactional memory (TM) systems execute atomic blocks concurrently and must thus be prepared for data conflicts. The TM system must then...
Arrvindh Shriraman, Sandhya Dwarkadas
CCGRID
2010
IEEE
13 years 4 months ago
Dynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds
Data-intensive parallel applications on clouds need to deploy large data sets from the cloud's storage facility to all compute nodes as fast as possible. Many multicast algori...
Tatsuhiro Chiba, Mathijs den Burger, Thilo Kielman...
EUROMED
2010
13 years 4 months ago
Capture and Processing of High Resolution 3D-Data of Sutra Inscriptions in China
Modern high resolution 3D-measuring techniques are widely used in quality control and industrial production, because they allow precise and reliable inspection of objects. Their po...
Natalie Schmidt, Frank Boochs, Rainer Schütze
AI
2011
Springer
13 years 2 months ago
Bounded approximate decentralised coordination via the max-sum algorithm
In this paper we propose a novel approach to decentralised coordination, that is able to efficiently compute solutions with a guaranteed approximation ratio. Our approach is base...
Alex Rogers, Alessandro Farinelli, Ruben Stranders...
« Prev « First page 1243 / 1257 Last » Next »