Sciweavers

389 search results - page 70 / 78
» Using Information from Prior Runs to Improve Automated Tunin...
Sort
View
CN
2000
98views more  CN 2000»
13 years 7 months ago
Dynamic pricing by software agents
We envision a future in which the global economy and the Internet will merge and evolve together into an information economy bustling with billions of economically motivated softw...
Jeffrey O. Kephart, James E. Hanson, Amy R. Greenw...
CHI
2006
ACM
14 years 7 months ago
Speech pen: predictive handwriting based on ambient multimodal recognition
It is tedious to handwrite long passages of text by hand. To make this process more efficient, we propose predictive handwriting that provides input predictions when the user writ...
Kazutaka Kurihara, Masataka Goto, Jun Ogata, Takeo...
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
14 years 2 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
IEEEPACT
2006
IEEE
14 years 1 months ago
Hardware support for spin management in overcommitted virtual machines
Multiprocessor operating systems (OSs) pose several unique and conflicting challenges to System Virtual Machines (System VMs). For example, most existing system VMs resort to gan...
Philip M. Wells, Koushik Chakraborty, Gurindar S. ...
SIGCOMM
2009
ACM
14 years 1 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...