Sciweavers

17789 search results - page 3554 / 3558
» Exceptional Use Cases
Sort
View
ISCA
2012
IEEE
212views Hardware» more  ISCA 2012»
11 years 10 months ago
TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on ...
Robert Martin, John Demme, Simha Sethumadhavan
SIGMETRICS
2012
ACM
253views Hardware» more  SIGMETRICS 2012»
11 years 10 months ago
Characterizing continuous time random walks on time varying graphs
In this paper we study the behavior of a continuous time random walk (CTRW) on a stationary and ergodic time varying dynamic graph. We establish conditions under which the CTRW is...
Daniel R. Figueiredo, Philippe Nain, Bruno F. Ribe...
ICDCS
2012
IEEE
11 years 10 months ago
eTransform: Transforming Enterprise Data Centers by Automated Consolidation
Abstract—Modern day enterprises have a large IT infrastructure comprising thousands of applications running on servers housed in tens of data centers geographically spread out. T...
Rahul Singh, Prashant J. Shenoy, K. K. Ramakrishna...
TKDE
2012
312views Formal Methods» more  TKDE 2012»
11 years 10 months ago
Efficient Fuzzy Type-Ahead Search in XML Data
—In a traditional keyword-search system over XML data, a user composes a keyword query, submits it to the system, and retrieves relevant answers. In the case where the user has l...
Jianhua Feng, Guoliang Li
SDM
2012
SIAM
247views Data Mining» more  SDM 2012»
11 years 10 months ago
Image Mining of Historical Manuscripts to Establish Provenance
he recent digitization of more than twenty million books has been led by initiatives from countries wishing to preserve their cultural heritage and by commercial endeavors, such a...
Bing Hu, Thanawin Rakthanmanon, Bilson J. L. Campa...
« Prev « First page 3554 / 3558 Last » Next »