Sciweavers

2125 search results - page 386 / 425
» Points with Type-2 Operations
Sort
View
WS
2006
ACM
14 years 1 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
ISCA
2005
IEEE
99views Hardware» more  ISCA 2005»
14 years 1 months ago
Disk Drive Roadmap from the Thermal Perspective: A Case for Dynamic Thermal Management
The importance of pushing the performance envelope of disk drives continues to grow, not just in the server market but also in numerous consumer electronics products. One of the m...
Sudhanva Gurumurthi, Anand Sivasubramaniam, Vivek ...
ISPASS
2005
IEEE
14 years 1 months ago
BioBench: A Benchmark Suite of Bioinformatics Applications
Recent advances in bioinformatics and the significant increase in computational power available to researchers have made it possible to make better use of the vast amounts of gene...
Kursad Albayraktaroglu, Aamer Jaleel, Xue Wu, Mano...
IWPSE
2005
IEEE
14 years 1 months ago
Evolution and Growth in Large Libre Software Projects
Software evolution research has recently focused on new development paradigms, studying whether laws found in more classic development environments also apply. Previous works have...
Gregorio Robles, Juan José Amor, Jesú...
MTV
2005
IEEE
100views Hardware» more  MTV 2005»
14 years 1 months ago
A Study of Architecture Description Languages from a Model-based Perspective
Abstract— Owing to the recent trend of using applicationspecific instruction-set processors (ASIP), many Architecture Description Languages (ADLs) have been created. They specif...
Wei Qin, Sharad Malik