Sciweavers

2699 search results - page 467 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
ISSTA
2012
ACM
11 years 10 months ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...
ICDE
2001
IEEE
113views Database» more  ICDE 2001»
14 years 9 months ago
Measuring and Optimizing a System for Persistent Database Sessions
High availability for both data and applications is rapidly becoming a business requirement. While database systems support recovery, providing high database availability, applica...
Roger S. Barga, David B. Lomet
MICCAI
2006
Springer
14 years 8 months ago
Simulation of Local and Global Atrophy in Alzheimer's Disease Studies
Abstract. We propose a method for atrophy simulation in structural MR images based on finite-element methods, providing data for objective evaluation of atrophy measurement techniq...
Oscar Camara-Rey, Martin Schweiger, Rachael I. Sca...
HPCA
2007
IEEE
14 years 8 months ago
A Scalable, Non-blocking Approach to Transactional Memory
Transactional Memory (TM) provides mechanisms that promise to simplify parallel programming by eliminating the need for locks and their associated problems (deadlock, livelock, pr...
Hassan Chafi, Jared Casper, Brian D. Carlstrom, Au...
HPCA
2001
IEEE
14 years 8 months ago
JETTY: Filtering Snoops for Reduced Energy Consumption in SMP Servers
We propose methods for reducing the energy consumed by snoop requests in snoopy bus-based symmetric multiprocessor (SMP) systems. Observing that a large fraction of snoops do not ...
Andreas Moshovos, Gokhan Memik, Babak Falsafi, Alo...