Sciweavers

5234 search results - page 1008 / 1047
» Simulation of Computer Network Attacks
Sort
View
ISCA
1998
IEEE
114views Hardware» more  ISCA 1998»
15 years 6 months ago
Tempest and Typhoon: User-Level Shared Memory
Future parallel computers must efficiently execute not only hand-coded applications but also programs written in high-level, parallel programming languages. Today's machines ...
Steven K. Reinhardt, James R. Larus, David A. Wood
SIGCOMM
1994
ACM
15 years 6 months ago
MACAW: A Media Access Protocol for Wireless LAN's
In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digit al assistants. Providing adequate network connectivity y...
Vaduvur Bharghavan, Alan J. Demers, Scott Shenker,...
121
Voted
AAAI
2007
15 years 4 months ago
Acquiring Visibly Intelligent Behavior with Example-Guided Neuroevolution
Much of artificial intelligence research is focused on devising optimal solutions for challenging and well-defined but highly constrained problems. However, as we begin creating...
Bobby D. Bryant, Risto Miikkulainen
CIC
2006
140views Communications» more  CIC 2006»
15 years 3 months ago
An Efficient Update Algorithm for Supporting Mobility in Structured P2P Systems
Structured peer to peer (P2P) systems organize a large number of nodes in well-defined structures and provide efficient and scalable search functionalities. They have been used as ...
Boxuan Gu, Hu Wang, Zongming Fei
WCE
2007
15 years 3 months ago
A Patch-by-Patch Shape Matching Procedure for Rigid Body Docking
Abstract—Docking simulates molecular interactions. Protein - protein docking, owing to the sizes of molecules, is a very challenging problem. As the number of degrees of freedom ...
Vipin K. Tripathi
« Prev « First page 1008 / 1047 Last » Next »