Sciweavers

711 search results - page 81 / 143
» Methodological frameworks for large-scale network analysis a...
Sort
View
CORR
2008
Springer
152views Education» more  CORR 2008»
13 years 9 months ago
Characterizing User Mobility in Second Life
In this work we present a measurement study of user mobility in Second Life. We first discuss different techniques to collect user traces and then focus on results obtained using ...
Chi-Anh La, Pietro Michiardi
DATE
2009
IEEE
119views Hardware» more  DATE 2009»
14 years 4 months ago
On-chip communication architecture exploration for processor-pool-based MPSoC
— MPSoC is evolving towards processor-pool (PP)-based architectures, which employ hierarchical on-chip network for inter- and intra-PP communication. Since the design space of PP...
Young-Pyo Joo, Sungchan Kim, Soonhoi Ha
DAC
2005
ACM
14 years 10 months ago
Designing logic circuits for probabilistic computation in the presence of noise
As Si CMOS devices are scaled down into the nanoscale regime, current computer architecture approaches are reaching their practical limits. Future nano-architectures will confront...
Kundan Nepal, R. Iris Bahar, Joseph L. Mundy, Will...
DPPI
2007
ACM
14 years 1 months ago
Exploring design concepts for sharing experiences through digital photography
In this research, we aim to explore meaningful design directions for future photography applications with a focus on the experiences around sharing. We review a wide-rage of photo-...
Heekyoung Jung, Kay Connelly
IFIP
2007
Springer
14 years 3 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...