Sciweavers

10805 search results - page 2030 / 2161
» Mapping Computation with No Memory
Sort
View
145
Voted
RAID
2007
Springer
15 years 10 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 10 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
141
Voted
VLDB
2007
ACM
114views Database» more  VLDB 2007»
15 years 10 months ago
IndeGS: Index Supported Graphics Data Server for CFD Data Postprocessing
Virtual reality techniques particularly in the field of CFD (computational fluid dynamics) are of growing importance due to their ability to offer comfortable means to interact...
Christoph Brochhaus, Thomas Seidl
CODES
2006
IEEE
15 years 10 months ago
Integrated analysis of communicating tasks in MPSoCs
Predicting timing behavior is key to efficient embedded real-time system design and verification. Especially memory accesses and co-processor calls over shared communication net...
Simon Schliecker, Matthias Ivers, Rolf Ernst
ICPADS
2006
IEEE
15 years 10 months ago
SPM Conscious Loop Scheduling for Embedded Chip Multiprocessors
One of the major factors that can potentially slow down widespread use of embedded chip multiprocessors is lack of efficient software support. In particular, automated code paral...
Liping Xue, Mahmut T. Kandemir, Guangyu Chen, Tayl...
« Prev « First page 2030 / 2161 Last » Next »