Sciweavers

1272 search results - page 124 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
IPPS
2007
IEEE
14 years 3 months ago
Securing Grid Data Transfer Services with Active Network Portals
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
APN
1999
Springer
14 years 1 months ago
Parallel Approaches to the Numerical Transient Analysis of Stochastic Reward Nets
Abstract. This paper presents parallel approaches to the complete transient numerical analysis of stochastic reward nets (SRNs) for both shared and distributed-memory machines. Par...
Susann C. Allmaier, David Kreische
CASES
2000
ACM
14 years 26 days ago
Flexible instruction processors
This paper introduces the notion of a Flexible Instruction Processor (FIP) for systematic customisation of instruction processor design and implementation. The features of our app...
Shay Ping Seng, Wayne Luk, Peter Y. K. Cheung
JAIR
1998
89views more  JAIR 1998»
13 years 9 months ago
An Empirical Approach to Temporal Reference Resolution
Scheduling dialogs, during which people negotiate the times of appointments, are common in everyday life. This paper reports the results of an in-depth empirical investigation of ...
Janyce Wiebe, Thomas P. O'Hara, Thorsten Öhrs...
SIGMOD
2005
ACM
145views Database» more  SIGMOD 2005»
14 years 9 months ago
Stratified Computation of Skylines with Partially-Ordered Domains
In this paper, we study the evaluation of skyline queries with partially-ordered attributes. Because such attributes lack a total ordering, traditional index-based evaluation algo...
Chee Yong Chan, Pin-Kwang Eng, Kian-Lee Tan