Sciweavers

3913 search results - page 733 / 783
» complexity 2006
Sort
View
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
14 years 4 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
P2P
2006
IEEE
211views Communications» more  P2P 2006»
14 years 4 months ago
Comparison of Image Similarity Queries in P2P Systems
Given some of the recent advances in Distributed Hash Table (DHT) based Peer-To-Peer (P2P) systems we ask the following questions: Are there applications where unstructured querie...
Wolfgang Müller 0002, P. Oscar Boykin, Nima S...
RTAS
2006
IEEE
14 years 4 months ago
Switch Scheduling and Network Design for Real-Time Systems
The rapid need for high bandwidth and low latency communication in distributed real-time systems is driving system architects towards high-speed switches developed for high volume...
Sathish Gopalakrishnan, Marco Caccamo, Lui Sha
RTCSA
2006
IEEE
14 years 4 months ago
Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems
Real-time embedded systems are increasingly being networked. In distributed real-time embedded applications, e.g., electric grid management and command and control applications, i...
Kyoung-Don Kang, Sang Hyuk Son
RTCSA
2006
IEEE
14 years 4 months ago
Instruction Scheduling with Release Times and Deadlines on ILP Processors
ILP (Instruction Level Parallelism) processors are being increasingly used in embedded systems. In embedded systems, instructions may be subject to timing constraints. An optimisi...
Hui Wu, Joxan Jaffar, Jingling Xue