Sciweavers

6465 search results - page 1139 / 1293
» On the Evaluation of Quality of Context
Sort
View
VTC
2007
IEEE
132views Communications» more  VTC 2007»
14 years 2 months ago
Collaborative Information Revelation and Collusion in "Word-of-Mouth" Access Selection Schemes
— “Word-of-Mouth”, a novel scheme for sharing the service quality experienced with different local networks, is presented and evaluated as a distributed solution for performi...
Pietro Lungaro
SBACPAD
2005
IEEE
176views Hardware» more  SBACPAD 2005»
14 years 1 months ago
Analyzing and Improving Clustering Based Sampling for Microprocessor Simulation
The time required to simulate a complete benchmark program using the cycle-accurate model of a microprocessor can be prohibitively high. One of the proposed methodologies, represe...
Yue Luo, Ajay Joshi, Aashish Phansalkar, Lizy Kuri...
ACMSE
2005
ACM
14 years 1 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
ERCIMDL
2005
Springer
109views Education» more  ERCIMDL 2005»
14 years 1 months ago
MedioVis - A User-Centred Library Metadata Browser
MedioVis is a visual information seeking system which was designed especially for library data. The objective target was to create a system which simplifies and optimizes the user...
Christian Grün, Jens Gerken, Hans-Christian J...
ICS
2005
Tsinghua U.
14 years 1 months ago
Low-power, low-complexity instruction issue using compiler assistance
In an out-of-order issue processor, instructions are dynamically reordered and issued to function units in their dataready order rather than their original program order to achiev...
Madhavi Gopal Valluri, Lizy Kurian John, Kathryn S...
« Prev « First page 1139 / 1293 Last » Next »