Sciweavers

11112 search results - page 2139 / 2223
» Computing Stuttering Simulations
Sort
View
122
Voted
IAT
2008
IEEE
15 years 9 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...
ICC
2008
IEEE
135views Communications» more  ICC 2008»
15 years 9 months ago
Using Soft-Line Recursive Response to Improve Query Aggregation in Wireless Sensor Networks
— In large Wireless Sensor Networks (WSNs), each hop might incur varying delays due to medium access contention, transmission and computation delays. Fast and efficient query re...
Xiaoming Lu, Matt Spear, Karl N. Levitt, Norman S....
240
Voted
ICCCN
2008
IEEE
15 years 9 months ago
TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs
—The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK — a no...
Avinash Srinivasan, Jie Wu
120
Voted
IEEEPACT
2008
IEEE
15 years 9 months ago
Improving support for locality and fine-grain sharing in chip multiprocessors
Both commercial and scientific workloads benefit from concurrency and exhibit data sharing across threads/processes. The resulting sharing patterns are often fine-grain, with t...
Hemayet Hossain, Sandhya Dwarkadas, Michael C. Hua...
106
Voted
IEEEPACT
2008
IEEE
15 years 9 months ago
Scalable and reliable communication for hardware transactional memory
In a hardware transactional memory system with lazy versioning and lazy conflict detection, the process of transaction commit can emerge as a bottleneck. This is especially true ...
Seth H. Pugsley, Manu Awasthi, Niti Madan, Naveen ...
« Prev « First page 2139 / 2223 Last » Next »