Sciweavers

36887 search results - page 7334 / 7378
» Are We All In the Same
Sort
View
TPDS
2008
78views more  TPDS 2008»
13 years 9 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...
TPDS
2008
150views more  TPDS 2008»
13 years 9 months ago
Mitosis: A Speculative Multithreaded Processor Based on Precomputation Slices
This paper presents the Mitosis framework, which is a combined hardware-software approach to speculative multithreading, even in the presence of frequent dependences among threads....
Carlos Madriles, Carlos García Quiño...
TSP
2008
118views more  TSP 2008»
13 years 9 months ago
Analytical Rate-Distortion-Complexity Modeling of Wavelet-Based Video Coders
Analytical modeling of the performance of video coders is essential in a variety of applications, such as power-constrained processing, complexity-driven video streaming, etc., whe...
Brian Foo, Yiannis Andreopoulos, Mihaela van der S...
JSAC
2007
132views more  JSAC 2007»
13 years 9 months ago
Capacity analysis of MediaGrid: a P2P IPTV platform for fiber to the node (FTTN) networks
— This paper studies the conditions under which P2P sharing can increase the capacity of IPTV services over FTTN networks. For a typical FTTN network, our study shows a) P2P shar...
Yennun Huang, Yih-Farn Chen, Rittwik Jana, Hongbo ...
AIL
2004
107views more  AIL 2004»
13 years 9 months ago
AI and the Conquest of Complexity in Law
The paper identi es some of the problems with legal systems and outlines the potential of AI technology for overcoming them. For expository purposes, this outline is based on a si...
L. Bibel
« Prev « First page 7334 / 7378 Last » Next »