Sciweavers

1777 search results - page 345 / 356
» Surveillance Event Detection
Sort
View
ISCA
2005
IEEE
117views Hardware» more  ISCA 2005»
14 years 2 months ago
Store Vulnerability Window (SVW): Re-Execution Filtering for Enhanced Load Optimization
The load-store unit is a performance critical component of a dynamically-scheduled processor. It is also a complex and non-scalable component. Several recently proposed techniques...
Amir Roth
DCOSS
2005
Springer
14 years 2 months ago
jWebDust : A Java-Based Generic Application Environment for Wireless Sensor Networks
Abstract. Wireless sensor networks can be very useful in applications that require the detection of crucial events, in physical environments subjected to critical conditions, and t...
Ioannis Chatzigiannakis, Georgios Mylonas, Sotiris...
IFIP
2005
Springer
14 years 2 months ago
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback
Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
Eunjong Kim, Daniel Massey, Indrajit Ray
IPMI
2005
Springer
14 years 2 months ago
Imaging Tumor Microenvironment with Ultrasound
Abstract. Recent advances in molecular biology are providing new opportunities for breast cancer imaging. Our approach uses ultrasound to image viscoelastic features of tumors. The...
Mallika Sridhar, Michael F. Insana
OOPSLA
2005
Springer
14 years 2 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....