Sciweavers

5675 search results - page 59 / 1135
» Exploiting Chaos for Computation
Sort
View
IAW
2003
IEEE
14 years 4 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
ICCSA
2010
Springer
14 years 4 months ago
ISATEM: An Integration of Socioeconomic and Spatial Models for Mineral Resources Exploitation
In the spatial-integrated socioeconomic model field, a multi-agent approach is appropriate for supporting applications modelled at a detailed territory scale, but it is less used t...
Fenintsoa Andriamasinoro, Daniel Cassard, Bruno Ma...
PADS
1999
ACM
14 years 3 months ago
Exploiting Temporal Uncertainty in Parallel and Distributed Simulations
Most work to date in parallel and distributed discrete event simulation is based on assigning precise time stamps to events, and time stamp order event processing. An alternative ...
Richard Fujimoto
DAC
1997
ACM
14 years 3 months ago
Multi-Way FPGA Partitioning by Fully Exploiting Design Hierarchy
In this paper, we present a new integrated synthesis and partitioning method for multiple-FPGA applications. This method rst synthesizes a design speci cation in a ne-grained way ...
Wen-Jong Fang, Allen C.-H. Wu
ACSC
2004
IEEE
14 years 2 months ago
Exploiting FPGA Concurrency to Enhance JVM Performance
The Java Programming Language has been praised for its platform independence and portability, but because of its slow execution speed on a software Java Virtual Machine (JVM), som...
James Parnis, Gareth Lee