Sciweavers

6666 search results - page 1330 / 1334
» Reconfigurable Computing for High Performance Networking App...
Sort
View
JNW
2007
100views more  JNW 2007»
15 years 2 months ago
Towards a Novel Metadata Information Service for Distributed Data Management
— The trend in Grid computing towards more data intensive applications, accessing more and more relational databases and requiring advanced integration of secondhand and publicly...
Alexander Wöhrer, Peter Brezany
GIS
2010
ACM
15 years 29 days ago
Reverse k-Nearest Neighbor monitoring on mobile objects
In this paper we focus on the problem of continuously monitoring the set of Reverse k-Nearest Neighbors (RkNNs) of a query object in a moving object database using a client server...
Tobias Emrich, Hans-Peter Kriegel, Peer Kröge...
178
Voted
ISW
2010
Springer
15 years 10 days ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
152
Voted
GI
2009
Springer
15 years 6 days ago
Source Conflicts in Bayesian Identification
: In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discuss...
Max Krüger, David Hirschhäuser
140
Voted
DAC
2003
ACM
16 years 3 months ago
The synthesis of cyclic combinational circuits
Combinational circuits are generally thought of as acyclic structures. It is known that cyclic structures can be combinational, and techniques have been proposed to analyze cyclic...
Marc D. Riedel, Jehoshua Bruck
« Prev « First page 1330 / 1334 Last » Next »