Sciweavers

510 search results - page 23 / 102
» Performance Improvement Methods for NETCONF-Based Configurat...
Sort
View
COMCOM
2007
100views more  COMCOM 2007»
13 years 7 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
ISCA
2007
IEEE
113views Hardware» more  ISCA 2007»
14 years 2 months ago
Thermal modeling and management of DRAM memory systems
With increasing speed and power density, high-performance memories, including FB-DIMM (Fully Buffered DIMM) and DDR2 DRAM, now begin to require dynamic thermal management (DTM) a...
Jiang Lin, Hongzhong Zheng, Zhichun Zhu, Howard Da...
EKNOW
2009
13 years 5 months ago
The Method for a Summarization of Product Reviews Using the User's Opinion
As the number of transactions in E-market places is growing, more and more product information and product reviews are posted on the Internet. Because customers want to purchase go...
Jung-Yeon Yang, Jaeseok Myung, Sang-goo Lee
IPPS
2006
IEEE
14 years 1 months ago
An adaptive dynamic grid-based approach to data distribution management
a This paper presents a novel Adaptive Dynamic Gridbased Data Distribution Management (DDM) scheme, which we refer to as ADGB. The main objective of our protocol is to optimize DDM...
Azzedine Boukerche, YunFeng Gu, Regina Borges de A...
SAFECOMP
1999
Springer
13 years 12 months ago
Hierarchically Performed Hazard Origin and Propagation Studies
Abstract. This paper introduces a new method for safety analysis called HiPHOPS (Hierarchically Performed Hazard Origin and Propagation Studies). HiP-HOPS originates from a number ...
Yiannis Papadopoulos, John A. McDermid