Sciweavers

20638 search results - page 4074 / 4128
» Network Computing
Sort
View
CSFW
2007
IEEE
14 years 2 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 2 months ago
A Two-Layer Characteristic-based Rate Control Framework for Low Delay Video Transmission
— In this paper, we present a two-layer rate control In [4], their rate controller TMN8 applied the Lagrange framework for low delay video transmission based on a multiplier to d...
Chun-Yuan Chang, Ming-Hung Chen, Cheng-Fu Chou, Di...
ICPADS
2007
IEEE
14 years 2 months ago
A scheduling algorithm for revenue maximisation for cluster-based Internet services
This paper proposes a new priority scheduling algorithm to maximise site revenue of session-based multi-tier Internet services in a multicluster environment. This research is part...
James Wen Jun Xue, Ligang He, Stephen A. Jarvis
ICRA
2007
IEEE
524views Robotics» more  ICRA 2007»
14 years 2 months ago
Concept and Design of A Fully Autonomous Sewer Pipe Inspection Mobile Robot "KANTARO"
— In current conventional method, the sewer pipe inspection is undertaken using a cable-tethered robot with an on-board video camera system, completely, tele-operated by human op...
Amir Ali Forough Nassiraei, Yoshinori Kawamura, Al...
ISCA
2007
IEEE
196views Hardware» more  ISCA 2007»
14 years 2 months ago
Anton, a special-purpose machine for molecular dynamics simulation
The ability to perform long, accurate molecular dynamics (MD) simulations involving proteins and other biological macromolecules could in principle provide answers to some of the ...
David E. Shaw, Martin M. Deneroff, Ron O. Dror, Je...
« Prev « First page 4074 / 4128 Last » Next »