Sciweavers

2485 search results - page 310 / 497
» Time Bounded Frequency Computations
Sort
View
ICDCS
2008
IEEE
14 years 2 months ago
Analysis of Maximum Executable Length for Detecting Text-Based Malware
The possibility of using purely text stream (keyboardenterable) as carrier of malware is under-researched and often underestimated. A text attack can happen at multiple levels, fr...
P. Kumar Manna, Sanjay Ranka, Shigang Chen
LCN
2008
IEEE
14 years 2 months ago
Optimal distance-based clustering for tag anti-collision in RFID systems
—Tag collisions can impose a major delay in Radio Frequency IDentification (RFID) systems. Such collisions are hard to overcome with passive tags due to their limited capabiliti...
Waleed Alsalih, Kashif Ali, Hossam S. Hassanein
CCGRID
2007
IEEE
14 years 2 months ago
Analysis and Synthesis of Pseudo-Periodic Job Arrivals in Grids: A Matching Pursuit Approach
Pseudo-periodicity is one of the basic job arrival patterns on data-intensive clusters and Grids. In this paper, a signal decomposition methodology called matching pursuit is appl...
Hui Li, Richard Heusdens, Michael Muskulus, Lex Wo...
ICPP
2007
IEEE
14 years 2 months ago
SOR: A Static File Assignment Strategy Immune to Workload Characteristic Assumptions in Parallel I/O Systems
The problem of statically assigning nonpartitioned files in a parallel I/O system has been extensively investigated. A basic workload characteristic assumption of existing solutio...
Tao Xie 0004
IPPS
2007
IEEE
14 years 2 months ago
Power-Aware Speedup
Power-aware processors operate in various power modes to reduce energy consumption with a corresponding decrease in peak processor throughput. Recent work has shown power-aware cl...
Rong Ge, Kirk W. Cameron