Sciweavers

1332 search results - page 264 / 267
» ideas 2008
Sort
View
IDA
2008
Springer
13 years 8 months ago
Estimating the depth of anesthesia using fuzzy soft computation applied to EEG features
Estimating the depth of anesthesia (DOA) is still a challenging area in anesthesia research. The objective of this study was to design a fuzzy rule based system which integrates el...
V. Esmaeili, Amin Assareh, M. B. Shamsollahi, Moha...
ISCA
2008
IEEE
185views Hardware» more  ISCA 2008»
13 years 8 months ago
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks. However, the performance of applications can severely...
Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-Chu...
MTA
2008
83views more  MTA 2008»
13 years 8 months ago
Caching collaboration and cache allocation in peer-to-peer video systems
Providing scalable video services in a peer-to-peer (P2P) environment is challenging. Since videos are typically large and require high communication bandwidth for delivery, many ...
Ying Cai, Zhan Chen, Wallapak Tavanapong
SCN
2008
Springer
136views Communications» more  SCN 2008»
13 years 8 months ago
An efficient data structure for network anomaly detection
Abstract-- Despite the rapid advance in networking technologies, detection of network anomalies at high-speed switches/routers is still far from maturity. To push the frontier, two...
Jieyan Fan, Dapeng Wu, Kejie Lu, Antonio Nucci
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Network externalities and the deployment of security features and protocols in the internet
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
Marc Lelarge, Jean Bolot