Sciweavers

378 search results - page 10 / 76
» Isolating the benefits of respect
Sort
View
EUROMICRO
2004
IEEE
14 years 26 days ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
WSC
2008
13 years 11 months ago
Iterative use of simulation and scheduling methodologies to improve productivity
Experienced and wise industrial engineering educators and practitioners have long understood that industrial engineering is a coherent discipline encompassing techniques that work...
Karthik Krishna Vasudevan, Ravindra Lote, Edward J...
ECIS
2001
13 years 10 months ago
Determining IT TCO: Lessons and extensions
All resources need to be managed to realize opportunities. Isolating the benefits of Information Technology and relating them to the associated costs has proved elusive and threat...
Donald H. Drury
CBMS
2008
IEEE
14 years 3 months ago
Bridging the Gap: Enabling CBIR in Medical Applications
Content-based Image Retrieval (CBIR) for medical images has received a significant research interest over the past decade as a promising approach to address the data management ch...
Sameer Antani, L. Rodney Long, George R. Thoma
IJHPCN
2006
116views more  IJHPCN 2006»
13 years 9 months ago
Implications of application usage characteristics for collective communication offload
Abstract-- The performance of collective communication operations is known to have a significant impact on the scalability of some applications. Indeed, the global, synchronous nat...
Ron Brightwell, Sue Goudy, Arun Rodrigues, Keith D...