Sciweavers

3799 search results - page 746 / 760
» Low Power or High Performance
Sort
View
ACSAC
2007
IEEE
14 years 2 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
MICRO
2007
IEEE
167views Hardware» more  MICRO 2007»
14 years 1 months ago
Informed Microarchitecture Design Space Exploration Using Workload Dynamics
Program runtime characteristics exhibit significant variation. As microprocessor architectures become more complex, their efficiency depends on the capability of adapting with wor...
Chang-Burm Cho, Wangyuan Zhang, Tao Li
MSS
2007
IEEE
109views Hardware» more  MSS 2007»
14 years 1 months ago
GreenStor: Application-Aided Energy-Efficient Storage
The volume of online data content has shown an un­ precedented growth in recent years. Fueling this growth are new federal regulations which warrant longer data re­ tention and ...
NagaPramod Mandagere, Jim Diehl, David Hung-Chang ...
GECCO
2007
Springer
308views Optimization» more  GECCO 2007»
14 years 1 months ago
Multiobjective clustering with automatic k-determination for large-scale data
Web mining - data mining for web data - is a key factor of web technologies. Especially, web behavior mining has attracted a great deal of attention recently. Behavior mining invo...
Nobukazu Matake, Tomoyuki Hiroyasu, Mitsunori Miki...
IPSN
2007
Springer
14 years 1 months ago
The worst-case capacity of wireless sensor networks
The key application scenario of wireless sensor networks is data gathering: sensor nodes transmit data, possibly in a multi-hop fashion, to an information sink. The performance of...
Thomas Moscibroda