Sciweavers

14386 search results - page 2693 / 2878
» The Chinese Generals Problem
Sort
View
IMC
2004
ACM
14 years 1 months ago
Measurement based characterization and provisioning of IP VPNs
Virtual Private Networks provide secure and reliable communication between customer sites. With increase in number and size of VPNs, providers need efficient provisioning techniqu...
Satish Raghunath, K. K. Ramakrishnan, Shivkumar Ka...
IMC
2004
ACM
14 years 1 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
ISLPED
2004
ACM
139views Hardware» more  ISLPED 2004»
14 years 1 months ago
Eliminating voltage emergencies via microarchitectural voltage control feedback and dynamic optimization
Microprocessor designers use techniques such as clock gating to reduce power dissipation. An unfortunate side-effect of these techniques is the processor current fluctuations th...
Kim M. Hazelwood, David Brooks
ITICSE
2004
ACM
14 years 1 months ago
Using interactive technology in a short java course: an experience report
Keeping students alert and responsive during lectures is a challenge even for experienced teachers in small group settings. Research has shown the importance of student participat...
Roberto E. Lopez-Herrejon, Morrie Schulman
IUI
2004
ACM
14 years 1 months ago
What role can adaptive support play in an adaptable system?
As computer applications become larger with every new version, there is a growing need to provide some way for users to manage the interface complexity. There are three different ...
Andrea Bunt, Cristina Conati, Joanna McGrenere
« Prev « First page 2693 / 2878 Last » Next »