Sciweavers

2845 search results - page 366 / 569
» Constraints over Ontologies
Sort
View
NOMS
2008
IEEE
14 years 4 months ago
Towards SLA-based optimal workload distribution in SANs
—Storage Area Networks (SANs) connect storage devices to servers over fast network interconnects. We consider the problem of optimal SAN configuration with the goal of meeting s...
Eray Gencay, Carsten Sinz, Wolfgang Küchlin
ICASSP
2007
IEEE
14 years 4 months ago
Toward Turbo Decoding of RNA Secondary Structure
We propose an iterative probabilistic algorithm for estimation of RNA secondary structure using sequence data from two homologous sequences. The method is intended to exploit inte...
Arif Ozgun Harmanci, Gaurav Sharma, David H. Mathe...
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 4 months ago
A Deterministic Cost-effective String Matching Algorithm for Network Intrusion Detection System
—Network Intrusion Detection Systems (NIDS) are more and more important in today’s network security for identifying and preventing malicious attacks over the network. This pape...
Nen-Fu Huang, Yen-Ming Chu, Chen-Ying Hsieh, Chi-H...
ICMCS
2007
IEEE
123views Multimedia» more  ICMCS 2007»
14 years 4 months ago
Efficient Parallelization of H.264 Decoding with Macro Block Level Scheduling
The H.264 decoder has a sequential, control intensive front end that makes it difficult to leverage the potential performance of emerging manycore processors. Preparsing is a fun...
Jike Chong, Nadathur Satish, Bryan C. Catanzaro, K...
INFOCOM
2007
IEEE
14 years 4 months ago
Balancing Interruption Frequency and Buffering Penalties in VBR Video Streaming
—The main goal of a streaming application is to enable the successful decoding of each video object before its displaying deadline is violated, and to recover from a deadline vio...
Guanfeng Liang, Ben Liang