Sciweavers

5325 search results - page 1017 / 1065
» Effective Computation for Nonlinear Systems
Sort
View
CCS
2003
ACM
14 years 2 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
PG
2002
IEEE
14 years 2 months ago
3D Video Recorder
We present the 3D Video Recorder, a system capable of recording, processing, and playing three–dimensional video from multiple points of view. We first record 2D video streams f...
Stephan Würmlin, Edouard Lamboray, Oliver G. ...
IEEEPACT
1999
IEEE
14 years 2 months ago
On Reducing False Sharing while Improving Locality on Shared Memory Multiprocessors
The performance of applications on large shared-memory multiprocessors with coherent caches depends on the interaction between the granularity of data sharing, the size of the coh...
Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanuja...
RAID
1999
Springer
14 years 1 months ago
Towards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
Glenn Mansfield
ICS
1998
Tsinghua U.
14 years 1 months ago
Data Prefetching for Software DSMs
In this paper we propose and evaluate the Adaptive++ technique, a novel runtime-only data prefetching strategy for software-based distributed shared-memory systems (software DSMs)...
Ricardo Bianchini, Raquel Pinto, Claudio Luis de A...
« Prev « First page 1017 / 1065 Last » Next »