Sciweavers

236 search results - page 40 / 48
» Firewall Security: Policies, Testing and Performance Evaluat...
Sort
View
SIGMETRICS
1997
ACM
13 years 12 months ago
File System Aging - Increasing the Relevance of File System Benchmarks
Benchmarks are important because they provide a means for users and researchers to characterize how their workloads will perform on different systems and different system architec...
Keith A. Smith, Margo I. Seltzer
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 7 months ago
Neuroevolutionary optimization
Temporal difference methods are theoretically grounded and empirically effective methods for addressing reinforcement learning problems. In most real-world reinforcement learning ...
Eva Volná
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
EUROSYS
2011
ACM
12 years 11 months ago
SRM-buffer: an OS buffer management technique to prevent last level cache from thrashing in multicores
Buffer caches in operating systems keep active file blocks in memory to reduce disk accesses. Related studies have been focused on how to minimize buffer misses and the caused pe...
Xiaoning Ding, Kaibo Wang, Xiaodong Zhang
RAID
2010
Springer
13 years 6 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin