Sciweavers

2060 search results - page 369 / 412
» Performability Evaluation of Networked Storage Systems Using...
Sort
View
IMC
2009
ACM
14 years 3 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
PEWASUN
2005
ACM
14 years 2 months ago
An error model for inter-vehicle communications in highway scenarios at 5.9GHz
The design and evaluation of Inter-Vehicle Communication (IVC) protocols rely much on the accurate and efficient computational simulations. For simulations of Medium Access Contro...
Yunpeng Zang, Lothar Stibor, Georgios Orfanos, Shu...
ISNN
2010
Springer
14 years 1 months ago
Multiattribute Bayesian Preference Elicitation with Pairwise Comparison Queries
Preference elicitation (PE) is an important component of interactive decision support systems that aim to make optimal recommendations to users by actively querying their preferen...
Shengbo Guo, Scott Sanner
LCTRTS
2004
Springer
14 years 2 months ago
Feedback driven instruction-set extension
Application specific instruction-set processors combine an efficient general purpose core with special purpose functionality that is tailored to a particular application domain. ...
Uwe Kastens, Dinh Khoi Le, Adrian Slowik, Michael ...
BIBE
2001
IEEE
179views Bioinformatics» more  BIBE 2001»
14 years 15 days ago
Texture-Based 3-D Brain Imaging
Different modalities in biomedical imaging, like CT, MRI and PET scanners, provide detailed crosssectional views of the human anatomy. The imagery obtained from these scanning dev...
Sagar Saladi, Pujita Pinnamaneni, Joerg Meyer