Sciweavers

908 search results - page 159 / 182
» Computational methodologies for modelling, analysis and simu...
Sort
View
ICS
2001
Tsinghua U.
14 years 4 days ago
Cache performance for multimedia applications
The caching behavior of multimedia applications has been described as having high instruction reference locality within small loops, very large working sets, and poor data cache p...
Nathan T. Slingerland, Alan Jay Smith
ACSAC
2004
IEEE
13 years 11 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
BMCBI
2006
112views more  BMCBI 2006»
13 years 7 months ago
A correlated motif approach for finding short linear motifs from protein interaction networks
Background: An important class of interaction switches for biological circuits and disease pathways are short binding motifs. However, the biological experiments to find these bin...
Soon-Heng Tan, Hugo Willy, Wing-Kin Sung, See-Kion...
CW
2003
IEEE
14 years 29 days ago
Virtual Experiment Environments Design for Science Education
Virtual reality technology is reported that the use of virtual reality(VR) as an educational tool can increase student interests, understanding and creative learning because of en...
Young-suk Shin
ASAP
2010
IEEE
143views Hardware» more  ASAP 2010»
13 years 9 months ago
Loop transformations for interface-based hierarchies IN SDF graphs
Data-flow has proven to be an attractive computation model for programming digital signal processing (DSP) applications. A restricted version of data-flow, termed synchronous data...
Jonathan Piat, Shuvra S. Bhattacharyya, Mickaë...