Sciweavers

8278 search results - page 1470 / 1656
» Context-Aware Process Networks
Sort
View
135
Voted
ACSAC
1999
IEEE
15 years 7 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
130
Voted
ARVLSI
1999
IEEE
162views VLSI» more  ARVLSI 1999»
15 years 7 months ago
Conjunction Search Using a 1-D, Analog VLSI-based, Attentional Search/Tracking Chip
The ability of animals to select a limited region of sensory space for scrutiny is an important factor in dealing with cluttered or complex sensory environments. Such an attention...
Timothy K. Horiuchi, Ernst Niebur
145
Voted
CODES
1999
IEEE
15 years 7 months ago
An MPEG-2 decoder case study as a driver for a system level design methodology
We present a case study on the design of a heterogeneous architecture for MPEG-2 video decoding. The primary objective of the case study is the validation of the SPADE methodology...
Pieter van der Wolf, Paul Lieverse, Mudit Goel, Da...
113
Voted
HPDC
1999
IEEE
15 years 7 months ago
Resource Co-Allocation in Computational Grids
Applications designed to execute on "computational grids" frequently require the simultaneous co-allocation of multiple resources in order to meet performance requiremen...
Karl Czajkowski, Ian T. Foster, Carl Kesselman
ICMCS
1999
IEEE
117views Multimedia» more  ICMCS 1999»
15 years 7 months ago
Scheduling of Adaptive Multimedia Documents
Multimedia documents are of importance in several application areas, such as education, training, advertising and entertainment. Since multimedia documents may comprise continuous...
Stefan Wirag
« Prev « First page 1470 / 1656 Last » Next »