Sciweavers

4624 search results - page 817 / 925
» Performance Evaluation of HPCN Applications
Sort
View
ACSAC
2008
IEEE
15 years 11 months ago
Defending Against Attacks on Main Memory Persistence
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...
AINA
2008
IEEE
15 years 11 months ago
Missing Value Estimation for Time Series Microarray Data Using Linear Dynamical Systems Modeling
The analysis of gene expression time series obtained from microarray experiments can be effectively exploited to understand a wide range of biological phenomena from the homeostat...
Connie Phong, Raul Singh
ICC
2008
IEEE
160views Communications» more  ICC 2008»
15 years 11 months ago
Localization via TDOA in a UWB Sensor Network using Neural Networks
In an Ultra-wide band (UWB) sensor network signal reflections from objects can be used to accurately determine the location. UWB signals are preferred in these types of sensor ne...
Salih Ergüt, Ramesh R. Rao, Özgür D...
ICDM
2008
IEEE
186views Data Mining» more  ICDM 2008»
15 years 11 months ago
xCrawl: A High-Recall Crawling Method for Web Mining
Web Mining Systems exploit the redundancy of data published on the Web to automatically extract information from existing web documents. The first step in the Information Extract...
Kostyantyn M. Shchekotykhin, Dietmar Jannach, Gerh...
INFOCOM
2008
IEEE
15 years 11 months ago
Firewall Compressor: An Algorithm for Minimizing Firewall Policies
—A firewall is a security guard placed between a private network and the outside Internet that monitors all incoming and outgoing packets. The function of a firewall is to exam...
Alex X. Liu, Eric Torng, Chad R. Meiners