Sciweavers

274 search results - page 48 / 55
» Improving vulnerability discovery models
Sort
View
ISCA
2005
IEEE
134views Hardware» more  ISCA 2005»
14 years 1 months ago
An Architecture Framework for Transparent Instruction Set Customization in Embedded Processors
Instruction set customization is an effective way to improve processor performance. Critical portions of application dataflow graphs are collapsed for accelerated execution on s...
Nathan Clark, Jason A. Blome, Michael L. Chu, Scot...
JCDL
2005
ACM
98views Education» more  JCDL 2005»
14 years 1 months ago
Using collection descriptions to enhance an aggregation of harvested item-level metadata
As an increasing number of digital library projects embrace the harvesting of item-level descriptive metadata, issues of description granularity and concerns about potential loss ...
Muriel Foulonneau, Timothy W. Cole, Thomas G. Habi...
GRID
2004
Springer
14 years 1 months ago
Self-Organizing Agents for Grid Load Balancing
A computational grid is a wide-area computing environment for cross-domain resource sharing and service integration. Resource management and load balancing are key concerns when i...
Junwei Cao
CIDM
2009
IEEE
13 years 11 months ago
Handling continuous attributes in Ant Colony Classification algorithms
Most real-world classification problems involve continuous (real-valued) attributes, as well as, nominal (discrete) attributes. The majority of Ant Colony Optimisation (ACO) classi...
Fernando E. B. Otero, Alex Alves Freitas, Colin G....
COOPIS
2004
IEEE
13 years 11 months ago
Comparing Approaches for Semantic Service Description and Matchmaking
Matching descriptions of user requirements against descriptions of service capabilities is crucial for the discovery of appropriate services for a given task. To improve the precis...
Sven Schade, Arnd Sahlmann, Michael Lutz, Florian ...