Sciweavers

140 search results - page 16 / 28
» Three non Conventional Paradigms of Parallel Computation
Sort
View
IJNSEC
2007
119views more  IJNSEC 2007»
13 years 9 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
TOG
2010
111views more  TOG 2010»
13 years 4 months ago
Detail-preserving fully-Eulerian interface tracking framework
This paper introduces a fully-Eulerian interface tracking framework that preserves the fine details of liquids. Unlike existing Eulerian methods, the proposed framework shows good...
Nambin Heo, Hyeong-Seok Ko
IPPS
2005
IEEE
14 years 3 months ago
Impact of Event Logger on Causal Message Logging Protocols for Fault Tolerant MPI
— Fault tolerance in MPI becomes a main issue in the HPC community. Several approaches are envisioned from user or programmer controlled fault tolerance to fully automatic fault ...
Aurelien Bouteiller, Boris Collin, Thomas Hé...
ICC
2007
IEEE
14 years 4 months ago
Adaptive Beam Clustering Optical Wireless System for An Indoor Channel
: The separating distance between the transceivers is one of the main factors that affect the quality of the received optical signal as the receiver changes locations in an optical...
Jamal M. Alattar, Jaafar M. H. Elmirghani
CN
2011
331views more  CN 2011»
13 years 4 months ago
P2P vs. IP multicast: Comparing approaches to IPTV streaming based on TV channel popularity
Already a popular application in the Internet, IPTV is becoming, among the service providers, a preferred alternative to conventional broadcasting technologies. Since many of the ...
Alex Bikfalvi, Jaime García-Reinoso, Iv&aac...