Sciweavers

13043 search results - page 2542 / 2609
» Simulation of the research process
Sort
View
IAT
2008
IEEE
14 years 2 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...
ICDCS
2008
IEEE
14 years 2 months ago
Resource Bundles: Using Aggregation for Statistical Wide-Area Resource Discovery and Allocation
Resource discovery is an important process for finding suitable nodes that satisfy application requirements in large loosely-coupled distributed systems. Besides inter-node heter...
Michael Cardosa, Abhishek Chandra
ICPP
2008
IEEE
14 years 2 months ago
Machine Learning Models to Predict Performance of Computer System Design Alternatives
Computer manufacturers spend a huge amount of time, resources, and money in designing new systems and newer configurations, and their ability to reduce costs, charge competitive p...
Berkin Özisikyilmaz, Gokhan Memik, Alok N. Ch...
IEEEPACT
2008
IEEE
14 years 2 months ago
Scalable and reliable communication for hardware transactional memory
In a hardware transactional memory system with lazy versioning and lazy conflict detection, the process of transaction commit can emerge as a bottleneck. This is especially true ...
Seth H. Pugsley, Manu Awasthi, Niti Madan, Naveen ...
INFOCOM
2008
IEEE
14 years 2 months ago
FLoD: A Framework for Peer-to-Peer 3D Streaming
—Interactive 3D content on Internet has yet become popular due to its typically large volume and the limited network bandwidth. Progressive content transmission, or 3D streaming,...
Shun-Yun Hu, Ting-Hao Huang, Shao-Chen Chang, Wei-...
« Prev « First page 2542 / 2609 Last » Next »