Sciweavers

1015 search results - page 191 / 203
» The data locality of work stealing
Sort
View
DIMVA
2004
13 years 10 months ago
Sensors for Detection of Misbehaving Nodes in MANETs
: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...
FLAIRS
2006
13 years 10 months ago
Designing an AI Elective to Encourage Undergraduate Research
This paper describes the design and execution of a roboticsthemed AI elective at a small liberal arts institution. An important goal of the course is to spark and nurture students...
Zachary Dodds
ICETE
2004
204views Business» more  ICETE 2004»
13 years 10 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
EFDBS
2000
13 years 10 months ago
Citation Linking in Federated Digital Libraries
Today, bibliographical information is kept in a variety of data sources world wide, some of them publically available, and some of them also offering information about citations m...
Eike Schallehn, Martin Endig, Kai-Uwe Sattler
CEC
2010
IEEE
13 years 9 months ago
An analysis of massively distributed evolutionary algorithms
Computational science is placing new demands on optimization algorithms as the size of data sets and the computational complexity of scientific models continue to increase. As thes...
Travis J. Desell, David P. Anderson, Malik Magdon-...