Sciweavers

676 search results - page 119 / 136
» Mining Patterns to Support Software Architecture Evaluation
Sort
View
ICITA
2005
IEEE
15 years 9 months ago
WiFiAdmin: An Intelligent Web-Based Management Environment for Wireless Networks
Wireless network communities face a number of difficulties due to lack of integration between network and community resources management. In this work, we present a novel solution...
Eythimios Dimopoulos, Athanasios Panousis, Evangel...
TIFS
2010
128views more  TIFS 2010»
15 years 2 months ago
Steganalysis by subtractive pixel adjacency matrix
This paper presents a novel method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which...
Tomás Pevný, Patrick Bas, Jessica J....
149
Voted
MICRO
2010
IEEE
242views Hardware» more  MICRO 2010»
15 years 1 months ago
ASF: AMD64 Extension for Lock-Free Data Structures and Transactional Memory
Advanced Synchronization Facility (ASF) is an AMD64 hardware extension for lock-free data structures and transactional memory. It provides a speculative region that atomically exec...
Jae-Woong Chung, Luke Yen, Stephan Diestelhorst, M...
ICS
2005
Tsinghua U.
15 years 9 months ago
Disk layout optimization for reducing energy consumption
Excessive power consumption is becoming a major barrier to extracting the maximum performance from high-performance parallel systems. Therefore, techniques oriented towards reduci...
Seung Woo Son, Guangyu Chen, Mahmut T. Kandemir
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
15 years 10 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...