Sciweavers

1370 search results - page 171 / 274
» Performance analysis and optimization of latency insensitive...
Sort
View
168
Voted
VLDB
1999
ACM
145views Database» more  VLDB 1999»
15 years 9 months ago
DBMSs on a Modern Processor: Where Does Time Go?
Recent high-performance processors employ sophisticated techniques to overlap and simultaneously execute multiple computation and memory operations. Intuitively, these techniques ...
Anastassia Ailamaki, David J. DeWitt, Mark D. Hill...
156
Voted
PAMI
2006
186views more  PAMI 2006»
15 years 4 months ago
Dynamic Shape and Appearance Models
We propose a model of the joint variation of shape and appearance of portions of an image sequence. The model is conditionally linear, and can be thought of as an extension of acti...
Gianfranco Doretto, Stefano Soatto
137
Voted
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
16 years 5 months ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
ICAC
2009
IEEE
15 years 11 months ago
Threat-model-driven runtime adaptation and evaluation of intrusion detection system
We present a mechanism for autonomous self-adaptation of a network-based intrusion detection system (IDS). The system is composed of a set of cooperating agents, each of which is ...
Martin Rehák, Eugen Staab, Volker Fusenig, ...
P2P
2009
IEEE
231views Communications» more  P2P 2009»
15 years 11 months ago
Measuring the Cost of Online Load-Balancing in Distributed Range-Queriable Systems
Distributed systems such as Peer-to-Peer overlays have been shown to efficiently support the processing of range queries over large numbers of participating hosts. In such system...
Ioannis Konstantinou, Dimitrios Tsoumakos, Nectari...