Sciweavers

3404 search results - page 535 / 681
» C Programming Tutorial
Sort
View
CLUSTER
2003
IEEE
15 years 3 months ago
Implications of a PIM Architectural Model for MPI
Memory may be the only system component that is more commoditized than a microprocessor. To simultaneously exploit this and address the impending memory wall, processing in memory...
Arun Rodrigues, Richard C. Murphy, Peter M. Kogge,...
DATE
2003
IEEE
108views Hardware» more  DATE 2003»
15 years 3 months ago
Generalized Posynomial Performance Modeling
This paper presents a new method to automatically generate posynomial symbolic expressions for the performance characteristics of analog integrated circuits. The coefficient set ...
Tom Eeckelaert, Walter Daems, Georges G. E. Gielen...
DISCEX
2003
IEEE
15 years 3 months ago
Monterey Security Enhanced Architecture Project
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
HICSS
2003
IEEE
120views Biometrics» more  HICSS 2003»
15 years 3 months ago
A Primitive Study of Logrolling in e-Negotiation
e-Negotiation involves two or more agents multilaterally bargaining for mutual gain, using information technologies in a cooperative problem-solving (CPS) environment. This paper ...
Patrick C. K. Hung
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
15 years 3 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...