Sciweavers

4647 search results - page 417 / 930
» Composite Design Patterns
Sort
View
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
13 years 6 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
WWW
2007
ACM
16 years 4 months ago
C-ODO: an OWL Meta-model for Collaborative Ontology Design
The design and maintenance of ontologies is a complex social collaborative activity, and this is true especially for semantic-web ontologies. On the one hand, such activity calls ...
Aldo Gangemi, Jos Lehmann, Valentina Presutti, Mal...
CLUSTER
2009
IEEE
15 years 1 months ago
Design alternatives for implementing fence synchronization in MPI-2 one-sided communication for InfiniBand clusters
Scientific computing has seen an immense growth in recent years. The Message Passing Interface (MPI) has become the de-facto standard for parallel programming model for distribute...
Gopalakrishnan Santhanaraman, Tejus Gangadharappa,...
ICC
2008
IEEE
145views Communications» more  ICC 2008»
15 years 10 months ago
A Low-Complexity Synchronization Design for MB-OFDM Ultra-Wideband Systems
In this paper, we investigate the low-complexity synchronization design for multi-band orthogonalfrequency-division-multiplexing (MB-OFDM) ultra-wideband (UWB) systems. We propose...
Zhenzhen Ye, Chunjie Duan, Philip V. Orlik, Jinyun...
EDBT
2008
ACM
206views Database» more  EDBT 2008»
16 years 4 months ago
Designing an inductive data stream management system: the stream mill experience
There has been much recent interest in on-line data mining. Existing mining algorithms designed for stored data are either not applicable or not effective on data streams, where r...
Hetal Thakkar, Barzan Mozafari, Carlo Zaniolo