Sciweavers

2433 search results - page 412 / 487
» Power laws in software
Sort
View
122
Voted
TVCG
2010
118views more  TVCG 2010»
15 years 2 months ago
A Curved Ray Camera for Handling Occlusions through Continuous Multiperspective Visualization
—Most images used in visualization are computed with the planar pinhole camera. This classic camera model has important advantages such as simplicity, which enables efficient sof...
Jian Cui, Paul Rosen, Voicu Popescu, Christoph M. ...
147
Voted
VIROLOGY
2010
162views more  VIROLOGY 2010»
15 years 2 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
CNSM
2010
15 years 2 months ago
Evaluating impact of manageability features on device performance
Manageability is a key design constraint for IT solutions, defined as the range of operations required to maintain and administer system resources through their lifecycle phases. E...
Jacob Leverich, Vanish Talwar, Parthasarathy Ranga...
171
Voted
ERSA
2010
115views Hardware» more  ERSA 2010»
15 years 2 months ago
Towards Adaptive Networking for Embedded Devices based on Reconfigurable Hardware
Research in communication networks has shown that the Internet architecture is not sufficient for modern communication areas such as the interconnection networks of super computing...
Enno Lübbers, Marco Platzner, Christian Pless...
212
Voted
ISOLA
2010
Springer
15 years 1 months ago
Context-Sensitivity in IPET for Measurement-Based Timing Analysis
Abstract. The Implicit Path Enumeration Technique (IPET) has become widely accepted as a powerful technique to compute upper bounds on the Worst-Case Execution Time (WCET) of time-...
Michael Zolda, Sven Bünte, Raimund Kirner