Sciweavers

1167 search results - page 144 / 234
» policy 2007
Sort
View
CEC
2007
IEEE
15 years 11 months ago
A genetic algorithm for solving the binning problem in networked applications detection
Network administrators need a tool that detects the kind of applications running on their networks, in order to allocate resources and enforce security policies. Previous work sho...
Maxim Shevertalov, Edward Stehle, Spiros Mancoridi...
DASFAA
2007
IEEE
202views Database» more  DASFAA 2007»
15 years 11 months ago
Optimizing Moving Queries over Moving Object Data Streams
With the increasing in demand on location-based aware services and RFIDs, efficient processing of continuous queries over moving object streams becomes important. In this paper, w...
Dan Lin, Bin Cui, Dongqing Yang
DATE
2007
IEEE
105views Hardware» more  DATE 2007»
15 years 11 months ago
Instruction-set customization for real-time embedded systems
Application-specific customization of the instruction set helps embedded processors achieve significant performance and power efficiency. In this paper, we explore customizatio...
Huynh Phung Huynh, Tulika Mitra
DATE
2007
IEEE
133views Hardware» more  DATE 2007»
15 years 11 months ago
Stochastic modeling and optimization for robust power management in a partially observable system
As the hardware and software complexity grows, it is unlikely for the power management hardware/software to have a full observation of the entire system status. In this paper, we ...
Qinru Qiu, Ying Tan, Qing Wu
ESCIENCE
2007
IEEE
15 years 11 months ago
Multiple Middleware Co-existence: Another Aspect of Grid Interoperation
Since the birth of computational and data grids, many middlewares have been developed and deployed. Currently, they are used in a multitude of isolated e-Infrastructures and a hot...
Roberto Barbera, Marco Fargetta, Emidio Giorgio