Sciweavers

1272 search results - page 98 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
DAC
2007
ACM
14 years 10 months ago
Layered Switching for Networks on Chip
We present and evaluate a novel switching mechanism called layered switching. Conceptually, the layered switching implements wormhole on top of virtual cut-through switching. To s...
Zhonghai Lu, Ming Liu, Axel Jantsch
TKDE
1998
163views more  TKDE 1998»
13 years 8 months ago
A Highly Effective Partition Selection Policy for Object Database Garbage Collection
—We investigate methods to improve the performance of algorithms for automatic storage reclamation of object databases. These algorithms are based on a technique called partition...
Jonathan E. Cook, Alexander L. Wolf, Benjamin G. Z...
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
14 years 9 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
JPDC
2007
86views more  JPDC 2007»
13 years 9 months ago
Strategies to create platforms for differentiated services from dedicated and opportunistic resources
This paper is proposing a new platform for implementing services in future service oriented architectures. The basic premise of our proposal is that by combining large volume of u...
Shah Asaduzzaman, Muthucumaru Maheswaran
SEMWEB
2010
Springer
13 years 7 months ago
Optimising Ontology Classification
Abstract. Ontology classification--the computation of subsumption hierarchies for classes and properties--is one of the most important tasks for OWL reasoners. Based on the algorit...
Birte Glimm, Ian Horrocks, Boris Motik, Giorgos St...