Sciweavers

2372 search results - page 430 / 475
» Probabilistic calling context
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
HyperCBR: Large-Scale Content-Based Routing in a Multidimensional Space
Abstract—Content-based routing (CBR) is becoming increasingly popular as a building block for distributed applications. CBR differs from classical routing paradigms as messages a...
Stefano Castelli, Paolo Costa, Gian Pietro Picco
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
14 years 2 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
RTCSA
2008
IEEE
14 years 2 months ago
Real-Time Scheduling Using Credit-Controlled Static-Priority Arbitration
—The convergence of application domains in new systems-on-chip (SoC) results in systems with many applications with a mix of soft and hard real-time requirements. To reduce cost,...
Benny Akesson, Liesbeth Steffens, Eelke Strooisma,...
AIMSA
2008
Springer
14 years 2 months ago
Using Text Segmentation to Enhance the Cluster Hypothesis
An alternative way to tackle Information Retrieval, called Passage Retrieval, considers text fragments independently rather than assessing global relevance of documents. In such a ...
Sylvain Lamprier, Tassadit Amghar, Bernard Levrat,...
COLCOM
2007
IEEE
14 years 2 months ago
Cooperative security in distributed sensor networks
— Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of sc...
Oscar García Morchon, Heribert Baldus, Tobi...