Sciweavers

3602 search results - page 206 / 721
» Isn't It About Time
Sort
View
VIZSEC
2007
Springer
14 years 4 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans
APCCAS
2006
IEEE
478views Hardware» more  APCCAS 2006»
14 years 4 months ago
An Active-RC Complex Filter with Mixed Signal Tuning System for Low-IF Receiver
—An active-RC complex filter synthesized from leapfrog low-pass prototype is proposed in this paper, which is less sensitive to components values variation comparing with the com...
Dingkun Du, Yongming Li, Zhihua Wang, Seeteck Tan
FOCS
2006
IEEE
14 years 4 months ago
Generalization of Binary Search: Searching in Trees and Forest-Like Partial Orders
We extend the binary search technique to searching in trees. We consider two models of queries: questions about vertices and questions about edges. We present a general approach t...
Krzysztof Onak, Pawel Parys
MICRO
2006
IEEE
89views Hardware» more  MICRO 2006»
14 years 4 months ago
DMDC: Delayed Memory Dependence Checking through Age-Based Filtering
One of the main challenges of modern processor design is the implementation of a scalable and efficient mechanism to detect memory access order violations as a result of out-of-o...
Fernando Castro, Luis Piñuel, Daniel Chaver...
ICECCS
2005
IEEE
171views Hardware» more  ICECCS 2005»
14 years 4 months ago
Behavior Capture and Test: Automated Analysis of Component Integration
Component-based technology is increasingly adopted to speed up the development of complex software through component reuse. Unfortunately, the lack of complete information about r...
Leonardo Mariani, Mauro Pezzè