Sciweavers

12334 search results - page 197 / 2467
» The Use of C
Sort
View
SIGCOMM
2009
ACM
15 years 11 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi
ICASSP
2008
IEEE
15 years 11 months ago
Environmental sound recognition using MP-based features
Defining suitable features for environmental sounds is an important problem in an automatic acoustic scene recognition system. As with most pattern recognition problems, extracti...
Selina Chu, Shrikanth S. Narayanan, C. C. Jay Kuo
DFT
2007
IEEE
103views VLSI» more  DFT 2007»
15 years 11 months ago
Reliable Network-on-Chip Using a Low Cost Unequal Error Protection Code
The network-on-chip (NoC) paradigm is seen as a way of facilitating the integration of a large number of computational and storage blocks on a chip to meet several performance and...
Avijit Dutta, Nur A. Touba
MIDDLEWARE
2007
Springer
15 years 10 months ago
Using checkpointing to recover from poor multi-site parallel job scheduling decisions
Recent research in multi-site parallel job scheduling leverages user-provided estimates of job communication characteristics to effectively partition the job across multiple clus...
William M. Jones
HPCA
2000
IEEE
15 years 9 months ago
Software-Controlled Multithreading Using Informing Memory Operations
Memorylatency isbecominganincreasingly importantperformance bottleneck, especially in multiprocessors. One technique for tolerating memory latency is multithreading, whereby we sw...
Todd C. Mowry, Sherwyn R. Ramkissoon