Sciweavers

14386 search results - page 2705 / 2878
» The Chinese Generals Problem
Sort
View
VEE
2010
ACM
238views Virtualization» more  VEE 2010»
14 years 1 months ago
Optimizing crash dump in virtualized environments
Crash dump, or core dump is the typical way to save memory image on system crash for future offline debugging and analysis. However, for typical server machines with likely abund...
Yijian Huang, Haibo Chen, Binyu Zang
CODES
2003
IEEE
14 years 1 months ago
Design space minimization with timing and code size optimization for embedded DSP
One of the most challenging problems in high-level synthesis is how to quickly explore a wide range of design options to achieve high-quality designs. This paper presents an Integ...
Qingfeng Zhuge, Zili Shao, Bin Xiao, Edwin Hsing-M...
COOPIS
2003
IEEE
14 years 1 months ago
Static Type-Inference for Trust in Distributed Information Systems
Abstract. Decision-makers in critical fields such as medicine and finance make use of a wide range of information available over the Internet. Mediation, a data integration techn...
Premkumar T. Devanbu, Michael Gertz, Brian Toone
GLVLSI
2003
IEEE
146views VLSI» more  GLVLSI 2003»
14 years 1 months ago
A practical CAD technique for reducing power/ground noise in DSM circuits
One of the fundamental problems in Deep Sub Micron (DSM) circuits is Simultaneous Switching Noise (SSN), which causes voltage fluctuations in the circuit power/ground networks. In...
Arindam Mukherjee, Krishna Reddy Dusety, Rajsaktis...
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
14 years 1 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
« Prev « First page 2705 / 2878 Last » Next »