Sciweavers

64 search results - page 9 / 13
» Modeling Set Associative Caches Behavior for Irregular Compu...
Sort
View
IPPS
2006
IEEE
14 years 1 months ago
Ant-inspired query routing performance in dynamic peer-to-peer networks
P2P Networks are highly dynamic structures since their nodes – peer users keep joining and leaving continuously. In the paper, we study the effects of network change rates on qu...
Mojca Ciglaric, Tone Vidmar
CRV
2005
IEEE
182views Robotics» more  CRV 2005»
14 years 1 months ago
Using Vanishing Points To Correct Camera Rotation In Images
Vanishing points provide valuable information regarding the camera model used to capture an image. To explore the relationship between classes of camera models and the location of...
Andrew C. Gallagher
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
13 years 11 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
CODES
2009
IEEE
14 years 2 months ago
Using binary translation in event driven simulation for fast and flexible MPSoC simulation
In this paper, we investigate the use of instruction set simulators (ISS) based on binary translation to accelerate full timed multiprocessor system simulation at transaction leve...
Marius Gligor, Nicolas Fournel, Frédé...
CDC
2008
IEEE
140views Control Systems» more  CDC 2008»
14 years 1 months ago
Model discrimination of polynomial systems via stochastic inputs
— Systems biologists are often faced with competing models for a given experimental system. Unfortunately, performing experiments can be time-consuming and expensive. Therefore, ...
Daniel Georgiev, Eric Klavins