Sciweavers

14403 search results - page 2844 / 2881
» Dynamical Systems Trees
Sort
View
IWCMC
2010
ACM
13 years 12 months ago
Secure wireless communication platform for EV-to-Grid research
"Vehicle to Grid" power or V2G will be a new green energy scheme that allows electricity to flow from Electric Vehicles (EVs) to power lines. The objective of this paper...
Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra...
CF
2005
ACM
13 years 12 months ago
Evaluation of extended dictionary-based static code compression schemes
This paper evaluates how much extended dictionary-based code compression techniques can reduce the static code size. In their simplest form, such methods statically identify ident...
Martin Thuresson, Per Stenström
CLEANDB
2006
ACM
142views Database» more  CLEANDB 2006»
13 years 12 months ago
QUEST: QUery-driven Exploration of Semistructured Data with ConflicTs and Partial Knowledge
An important reality when integrating scientific data is the fact that data may often be "missing", partially specified, or conflicting. Therefore, in this paper, we pre...
Yan Qi 0002, K. Selçuk Candan, Maria Luisa ...
EUROPAR
2008
Springer
13 years 11 months ago
MPC: A Unified Parallel Runtime for Clusters of NUMA Machines
Over the last decade, Message Passing Interface (MPI) has become a very successful parallel programming environment for distributed memory architectures such as clusters. However, ...
Marc Pérache, Hervé Jourdren, Raymon...
DIMVA
2010
13 years 11 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
« Prev « First page 2844 / 2881 Last » Next »