Sciweavers

14558 search results - page 2883 / 2912
» Resources
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 2 months ago
Exploiting Temporal Complex Network Metrics in Mobile Malware Containment
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed m...
John Tang, Cecilia Mascolo, Mirco Musolesi, Vito L...
JNCA
2011
126views more  JNCA 2011»
13 years 2 months ago
Coordinated session-based admission control with statistical learning for multi-tier internet applications
Popular Internet applications deploy a multi-tier architecture, with each tier provisioning a certain functionality to its preceding tier. In this paper, we address the challengin...
Sireesha Muppala, Xiaobo Zhou
MICRO
2011
IEEE
407views Hardware» more  MICRO 2011»
13 years 2 months ago
Thread Cluster Memory Scheduling
In a modern chip-multiprocessor system, memory is a shared resource among multiple concurrently executing threads. The memory scheduling algorithm should resolve memory contention...
Yoongu Kim, Michael Papamichael, Onur Mutlu, Mor H...
NAR
2011
227views Computer Vision» more  NAR 2011»
13 years 2 months ago
VnD: a structure-centric database of disease-related SNPs and drugs
Numerous genetic variations have been found to be related to human diseases. Significant portion of those affect the drug response as well by changing the protein structure and fu...
Jin Ok Yang, Sangho Oh, Gunhwan Ko, Seong-Jin Park...
SIGOPS
2011
255views Hardware» more  SIGOPS 2011»
13 years 2 months ago
Bridging functional heterogeneity in multicore architectures
Heterogeneous processors that mix big high performance cores with small low power cores promise excellent single– threaded performance coupled with high multi–threaded through...
Dheeraj Reddy, David A. Koufaty, Paul Brett, Scott...
« Prev « First page 2883 / 2912 Last » Next »