Sciweavers

2236 search results - page 361 / 448
» Intrusion detection techniques and approaches
Sort
View
IPPS
2003
IEEE
14 years 2 months ago
Miss Penalty Reduction Using Bundled Capacity Prefetching in Multiprocessors
While prefetch has proven itself useful for reducing cache misses in multiprocessors, traffic is often increased due to extra unused prefetch data. Prefetching in multiprocessors...
Dan Wallin, Erik Hagersten
COMPGEOM
2000
ACM
14 years 1 months ago
Fast computation of generalized Voronoi diagrams using graphics hardware
: We present a new approach for computing generalized Voronoi diagrams in two and three dimensions using interpolation-based polygon rasterization hardware. The input primitives ma...
Kenneth E. Hoff III, Tim Culver, John Keyser, Ming...
DIALM
1999
ACM
127views Algorithms» more  DIALM 1999»
14 years 1 months ago
The performance of query control schemes for the zone routing protocol
—In this paper, we study the performance of route query control mechanisms for the Zone Routing Protocol (ZRP) for ad hoc networks. ZRP proactively maintains routing information ...
Zygmunt J. Haas, Marc R. Pearlman
ICPP
1999
IEEE
14 years 1 months ago
Improving Performance of Load-Store Sequences for Transaction Processing Workloads on Multiprocessors
On-line transaction processing exhibits poor memory behavior in high-end multiprocessor servers because of complex sharing patterns and substantial interaction between the databas...
Jim Nilsson, Fredrik Dahlgren
MICCAI
1999
Springer
14 years 1 months ago
A 3d Puzzle for Learning Anatomy
We present a new metaphor for learning anatomy - the 3d puzzle. With this metaphor students learn anatomic relations by assembling a geometric model themselves. For this purpose, a...
Bernhard Preim, Felix Ritter, Oliver Deussen