Sciweavers

388 search results - page 56 / 78
» Telecollaboration - a case study for performance analysis of...
Sort
View
SIGMOD
2010
ACM
217views Database» more  SIGMOD 2010»
14 years 1 months ago
Mining knowledge from databases: an information network analysis approach
Most people consider a database is merely a data repository that supports data storage and retrieval. Actually, a database contains rich, inter-related, multi-typed data and infor...
Jiawei Han, Yizhou Sun, Xifeng Yan, Philip S. Yu
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 9 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
CASES
2007
ACM
14 years 1 months ago
Eliminating inter-process cache interference through cache reconfigurability for real-time and low-power embedded multi-tasking
We propose a technique which leverages configurable data caches to address the problem of cache interference in multitasking embedded systems. Data caches are often necessary to p...
Rakesh Reddy, Peter Petrov
CORR
2007
Springer
148views Education» more  CORR 2007»
13 years 9 months ago
Optimal Power Allocation for Distributed Detection over MIMO Channels in Wireless Sensor Networks
—In distributed detection systems with wireless sensor networks, the communication between sensors and a fusion center is not perfect due to interference and limited transmitter ...
Xin Zhang, H. Vincent Poor, Mung Chiang
EMSOFT
2007
Springer
14 years 3 months ago
Methods for multi-dimensional robustness optimization in complex embedded systems
Design space exploration of embedded systems typically focuses on classical design goals such as cost, timing, buffer sizes, and power consumption. Robustness criteria, i.e. sensi...
Arne Hamann, Razvan Racu, Rolf Ernst