Sciweavers

2125 search results - page 364 / 425
» Points with Type-2 Operations
Sort
View
FAST
2004
13 years 9 months ago
CAR: Clock with Adaptive Replacement
CLOCK is a classical cache replacement policy dating back to 1968 that was proposed as a low-complexity approximation to LRU. On every cache hit, the policy LRU needs to move the a...
Sorav Bansal, Dharmendra S. Modha
ISSA
2004
13 years 9 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
USS
2004
13 years 9 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
SIP
2003
13 years 9 months ago
Polyphase Antialiasing in Enlargements
Changing resolution of images is a common operation. It is also common to use simple, i.e., small interpolation kernels satisfying some ”smoothness” qualities that are determi...
Daniel Seidner
LISA
1994
13 years 9 months ago
The Group Administration Shell and the GASH Network Computing Environment
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exact...
Jonathan Abbey