Sciweavers

1791 search results - page 219 / 359
» Behavioral Operations
Sort
View
166
Voted
USS
2008
15 years 6 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
ASPLOS
2008
ACM
15 years 5 months ago
The mapping collector: virtual memory support for generational, parallel, and concurrent compaction
Parallel and concurrent garbage collectors are increasingly employed by managed runtime environments (MREs) to maintain scalability, as multi-core architectures and multi-threaded...
Michal Wegiel, Chandra Krintz
ICAI
2004
15 years 5 months ago
Using Fuzzy Clustering for Real-time Space Flight Safety
To ensure space flight safety, it is necessary to monitor myriad sensor readings on the ground and in flight. Since a space shuttle has many sensors, monitoring data and drawing c...
Charles Lee, Darrin M. Hanna, Richard E. Haskell, ...
FGCS
1992
103views more  FGCS 1992»
15 years 5 months ago
Parallel Inference Machine PIM
: There have been no major control problems during the first three years of the new Tokaido-Sanyo Shinkansen (bullet train) Programmed Route Control (PRC) computer system. Prior to...
Kazuo Taki
163
Voted
CVGIP
2002
126views more  CVGIP 2002»
15 years 3 months ago
Dual Mesh Resampling
The dual of a 2-manifold polygonal mesh without boundary is commonly defined as another mesh with the same topology (genus) but different connectivity (vertex-face incidence), in ...
Gabriel Taubin