Sciweavers

680 search results - page 16 / 136
» Analyzing the Effectiveness and Applicability of Co-training
Sort
View
DSRT
2008
IEEE
14 years 1 months ago
Design of Application-Specific Incentives in P2P Networks
A rational P2P node may decide not to provide a particular resource or to provide it with degraded quality. If nodes are very likely to behave this way, or if the failure of an P2...
Andrew Roczniak, Abdulmotaleb El-Saddik, Ross Kouh...
TCAD
2008
115views more  TCAD 2008»
13 years 7 months ago
Statistical Thermal Profile Considering Process Variations: Analysis and Applications
The nonuniform substrate thermal profile and process variations are two major concerns in the present-day ultradeep submicrometer designs. To correctly predict performance/ leakage...
Javid Jaffari, Mohab Anis
COMPSAC
2003
IEEE
14 years 24 days ago
Sensitivity Analysis of Software Reliability for Component-Based Software Applications
The parameters in these software reliability models are usually directly obtained from the field failure data. Due to the dynamic properties of the system and the insufficiency of...
Jung-Hua Lo, Chin-Yu Huang, Sy-Yen Kuo, Michael R....
ISQED
2003
IEEE
109views Hardware» more  ISQED 2003»
14 years 23 days ago
Modeling and Analysis of Power Distribution Networks for Gigabit Applications
—As the operating frequency of digital systems increases and voltage swing decreases, it becomes very important to characterize and analyze power distribution networks (PDNs) acc...
Wendemagegnehu T. Beyene, Chuck Yuan, Joong-Ho Kim...
CCS
2008
ACM
13 years 9 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee